Los Angeles Times/Joel Rubin, Contact Reporter, "FBI unlocks San Bernardino shooter's iPhone, drops Apple legal fight."
"Federal officials said Monday that they have unlocked the iPhone
belonging to one of the San Bernardino shooters and are dropping a
request in front of a federal judge that sought to force Apple to help
with that effort.
FBI hired 3rd-party to unlock the terrorist iPhone |
Apple customer crime privacy vs. FBI |
Cracked the code |
Related article. San Francisco Chronicle/SF Gate/Associated Press/Technology/Tami Abdollah and Brandon Bailey, 3/28/16, "Justice Department cracks iPhone; withdraws legal action." .... Apple was headed for a courtroom showdown with the government last week, until federal prosecutors abruptly asked for a postponement so they could test a potential solution that was brought to them by a party outside of the U.S. government the previous weekend. .... The withdrawal of the court process also takes away Apple's ability to legally request details on the method the FBI used in this case."
Note graphic and photographics. Scales facepage image from CNN Money, 3/3/16, "Who's with Apple and who's with the FBI." Eye from Cyber Security Daily. Cracking an I phone by Fone Fox from The Guardian news/US Edition 9/28/15, "iPhone 6S: bent, scratched, dropped and dunked in water - how durable is it?"
Posted by Kathy Meeh
6 comments:
I have Apple Stock and I want what's best for Apple but I think the Gov't wasn't hard enough on Cook. I think it was a game of chicken.
Steve,
You are a computer guru could you have hacked into the I-phone
It is possible to scan SSD (storage used in modern iPhones and Android devices) using a very high resolution electron microscope. This technology is at least 40 yrs old if not more. Once you are able to scan the "state" of the SSD, it should be possible to replicate the exact state on another SSD. Sort of like a photocopy but a bit sophisticated. And once you have a copy, one can run brute force decryption until some value between 0000 and 9999 works.
So, it was always possible to crack the encryption implemented by Apple using a very very expensive electron microscope, some very sophisticated low level device programming and about 1000 computers to run the brute force decryption.
What FBI wanted was a master-key that wouldn't require using an electron microscope or a massive super computer to run the brute force.
Basically, FBI would require to send any phone of particular interest to a high-end lab for expensive forensics. They were seeking a one-time easy/cheap solution that would work for them in perpetuity. Apple declined.
That is my personal opinion anyway. I could be entirely wrong.
I would have threatened to put Cook in jail if he didn't comply.
You know the Feds are going to be all up in their asses now.
@8:06 -- you would, wouldn't you? Let me remind you of something ..
The Fifth Amendment No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.
Post a Comment