[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Snowden sasys FBI can unlock iPhone
- To: [email protected]
- Subject: Snowden sasys FBI can unlock iPhone
- From: [email protected] (Steve Kinney)
- Date: Thu, 10 Mar 2016 19:14:56 -0500
- In-reply-to: <CAKtE3zcR1mfBpY4PU7QafWD2zde_JWr3oK+TFxO=Yy37XRbmKQ@mail.gmail.com>
- References: <CAO17205bQGKPqd8Twqi3CMThyfsWgXr3JKHJMybYx14=MfUs4Q@mail.gmail.com> <CAKtE3zcR1mfBpY4PU7QafWD2zde_JWr3oK+TFxO=Yy37XRbmKQ@mail.gmail.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 03/10/2016 06:46 PM, Travis Biehn wrote:
> This is all true.
>
> It's a bit easier to attack, actually.
Yup, if the erasable "user selected" key can be read out then
restored from backup after the OS erases it, no problem: A few
days of careful tinkering with hardware, testing proofs of concept
against /other/ iPhones, then a few minutes of automated attack
against the /interesting/ iPhone.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)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=rllm
-----END PGP SIGNATURE-----