FBI Will not Tell Apple How It Hacked iPhoneAdded: Friday, April 29th, 2016
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2016
A few weeks ago, the Federal Bureau of Investigation purchased a hacking tool for $1.3m to break into the iPhone from the San Bernardino shooting case. However, the agency wasn’t sure what exactly it paid for. Soon after the successful hack, the FBI claimed it wouldn’t tell Apple about the security flaw that made it possible. The agency explained that it didn’t buy the rights to the technical details of the hacking tool.
The government dropped the court case and announced it had purchased a special hacking tool and therefore no longer needed Apple’s help right before the court hearing on the issue. The FBI has since disclosed some details about the hacking tool – for example, that it originated from outside the government and cost “more than FBI director will be paid during the rest of his tenure” (which is about $1.3m). It was also made clear that it only works on an iPhone 5C and older models.
It is a common practice for the US three-letter agencies to buy security flaws in consumer software. The major condition is to keep the flaws secret and then use them to hack into suspects’ or intelligence targets’ devices. However, this practice is widely criticized because it requires hiding the security flaws from the developers, thus leaving all consumers vulnerable to hackers who could also discover the same flaw.
Back in 2014, the White House announced a review board to look at the severity of such flaws that the government investigators wanted to remain not fixed, and weigh the importance of the investigation against the public security interest in patching the vulnerability. So, the computer security advocates urged the agency to submit its hacking tool to this review board, but the agency claimed it wouldn’t do this because it couldn’t.
Friday, April 29th, 2016
|Who did they buy the hacking tool from?|
|Don't you mean "Who did we buy the hacking tool from?" It was bought with taxpayer money. Whoever it was, should let Apple know what the exploited weakness was. Then, Apple can fix it and the FBI will have to either buy an update or a new hacking tool. Just like any typical anti-virus software works. A vicious cycle isn't it? This is how you know that NCIS is fiction. Abby and McGee would never go crying to Apple, can you unlock this phone for us???...or even have to threaten to sue Apple to get into a terrorists cell phone.|
|the lies just keep coming. govt thinks we the people are meaningless.|
|they like to call us all sheeple for good reason..|
|I had a guess that some one made a hack out of a service provided. I believe that the iphone 5 and below had a lost phone service that was exploited. I heard that the iphone 6 has a problem with pedophiles using them. That is what a FBI agent said. He said all of them were pedophiles and I guessed may be there was a fast food hamburger app on it and it went to gay people and pedophiles.|
|@ #4.. Herd Mentality... Most humans suffer from it... And yes, those that do suffer from it are called cattle or sheep... But for me, i'm a squirrel up in a tree laughing at the cattle, and tossing nuts down at them..|
|I wonder why the FBI won't reveal who hacked the phone?|
|posted by (2016-05-01 13:03:50)|
|It was the fat neckbeard from CSI Cyber|
|@faceless have you ever seen the south park episode where cartman is on jerry springer or some show like that and runs around like a little biatch saying i do what i want thats the FBI in a nutshell hope that answered you question also @mike_oxhard i think maybe the local news is about the only non fiction on the idiot box..maybe....sometimes|
|posted by (2016-05-02 06:28:11)|
|If the phone was still powered on the key can be pulled from memory. Afaik every device and computer is and has been vulnerable and will continue to be for ages.|
|KNEWSMANK no it doesn't answer the questions. Asking the right questions is paramount. Who hacked the phone and why is it a secret. We may never know.||
Most Popular Stories