FBI Is Required to Share Its Way to Unlock iPhonesAdded: Monday, April 4th, 2016
Category: Bit Torrent Freedom > The Industries Of Records, Gaming, Software, Movies
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2016
After the Federal Bureau of Investigations announced it had a technique to hack into the iPhone of a San Bernardino gunman (which Apple says is impossible on current models without a user’s passcode), the agency faced a series of tough questions. Of course, many other people understood they could benefit from the technology – from local police to teenagers’ parents.
The FBI keeps the technique secret, but the suggestions are that it relies on a security flaw in Apple’s iOS. Accordingly, the FBI understands that if the secret is shared, Apple could learn about the technique and patch it.
However, lots of other people want access to locked iPhones. For example, a father in Italy asked Apple to unlock his dead son’s phone to get his stored pictures or said he would try the FBI’s technique. Then, a local prosecutor in Arkansas announced that the FBI had agreed to share its technique in a murder case involving Apple devices. However, he may have gotten ahead of himself, as the FBI corrected a local law enforcement official, saying that the police did ask the agency for help unlocking the phone but the FBI hadn’t yet received the devices.
The agency’s spokesperson explained that the FBI frequently receives requests from its local partners to provide expert technical assistance, and they are considered on a case-by-case basis. The request in question was not related to the San Bernardino case.
There was also a murder case in Louisiana, where a woman was shot at her doorstep. The victim’s iPhone backups stop months before her death, and police believe that scrolling through her iPhone diary and text messages may help. The problem is that the police doesn’t know the iPhone’s passcode.
It should be noted that there are many other ways to get information from an Apple device: data can be backed up on iCloud, or other techniques can be used to crack open phones running older versions of iOS. But if the FBI has a panacea, it changes everything. For example, a district attorney for New York county has said in the past that there were close to 200 phones linked to criminal cases that his office was unable to unlock. The attorney realizes that most of criminal investigations stalled by default device encryption will remain so until the government intervenes.
Monday, April 4th, 2016
|I fail to see in the story where it states that the "FBI is required to share it's way to unlock iPhones". Misleading headline.|
|Agreed with above comment.|
|Oh they will share if it somehow furthers their own agenda otherwise it aint happening.|
|Or it's all BS and the FBI hasn't unlocked sh!t, and just trying to save face because Apple will just tie up the case in the courts for years...|
|It was my understanding from the sherrifs video that the fbi had asked the police to crack the phone and it was already presumed it had no relevant data on it as firstly it was his works phone and secondly it had not been used in 6 weeks (this was known),from what I read previously the feds had okayed the police to crack the phone, but all they ended up doing was resetting it losing any further data that may have been stored on the cloud.If the feds have any data now they must`ve pulled it off the server/cloud or had it from Apple in the first place because the phone was secured and attempting brute force will either reset it or brick it as is done in most security scenarios.Personally I think its just another tolling of the bell by the friendly federales testing the waters to defeating encryption or getting carte blanc to open phones for anything they want in the future ,I can see them trying to put through a bill to support the free access of information without warrant and citing this and other cases to get what they want albeit there was no info they had already said this from the sheriffs statement on camera.|
|https://theintercept.com/2016/03/28/fbi-got-into-san-bernardino-killers-iphone-without-apples-help/ they say they have, but telling nothing as far as san bernadino phone,but I liked the last paragraph about Tor and Firefox|
“The FBI has been sitting on a Firefox/Tor exploit for more than a year,” tweeted Chris Soghoian, principal technologist for the American Civil Liberties Union. “The equities process is a farce.”.
|posted by (2016-04-04 21:14:35)|
|They should! Just use the excuse of "threat to national security" like they always do.|
|posted by (2016-04-04 23:56:35)|
|The 'unlocking' requires physical removal of the devices memory. It's not just achieved through software or crude hacking of the device. It's a real hands on procedure that isn't a 10 minute job. The FBI used an Israeli company to achieve this and probably made some agreement (and large payment) that they taught the FBI the technique so they can now use it themselves.|
This is most likely reasoning.
|I don't believe anything the government says about that phone. I'm with the people that say proof, or it didn't happen.|
|This entire story is just a distraction. USA has bigger problems than this and they aren't solved by allowing a Federal agency to chip away at our right to privacy.|
|posted by (2016-04-05 09:53:01)|
|@Asymmetric, why? There are several technical websites that discuss the encryption in the 5c and the SEVERAL possible ways of attack. This is a trivial model. It's the current models you could be suspicious of cracking, but a 5c is really child's play to those with skills and equipment.|
You people want to be spoonfed simple answers from highly technical people, and then choose to ignore or not believe it anyways. *eyeroll*
|Timbo you don't get it, it's a lie the SB killings.|
In the Gaming community it's called.. "Screen Shot or it never happened"
|If it can get the feds on me, I store it in my head ... not on my communication devices||
Most Popular Stories