All Apple news

The expert told how the FBI will crack iPhone terrorist without the help of Apple

On Tuesday the FBI has officially stated that she doesn’t want help in the Apple hacking iPhone 5c terrorist Syed Farooq. And security experts seem to guess how the secret services are going to get access to the data terrorists, killing 16 people in San Bernardino.

This story lasts for almost a month and is a hot topic not only in the IT world, but American society, which she almost split in two. And now, less than 24 hours before the case was to be heard in court, the FBI suddenly announced that the Apple no longer required. Or rather, “likely not required”. The office took a break until April 5 to check out the “new method” which will allow you to crack the password on an iPhone without using Apple. But if he does not help, then the FBI would come again to the court.

As writes Delfi, the FBI messed up the loud drama of this year, the most interesting place. And not really say — how’s she going to hack the smartphone of the terrorist. Said only that the offer of help came from a “third party contractor”

How the FBI will crack iPhone terrorist

In the community of security experts debate about which options are the FBI and Apple have been raging for a few weeks. During this time they discussed various options and now that the FBI has given certain inputs which have experts ready to talk about what the Agency will do and what it will do.

The most authoritative is the opinion of Jonathan Zdziarski, a famous security expert with Apple products. In his blog he details apart, what options are available to the FBI and why it is likely to have chosen a well-defined method of hacking.

Read also:   iPad Pro is the last chance for Apple to stop the sales fall tablets

So, here’s what the FBI will not do:

  • Physically breaking the chip, because if a method will not work, data will be lost forever and Apple can’t help at all desire.
  • To use any vulnerability found by a hacker “overnight”. Unethical and risky from a legal point of view.
  • Use a hole found by experts of the NSA, because the help came “from a third-party contractor.”
  • Generally use a software vulnerability or an exploit, because it test not need two weeks to verify that it works in a few hours, and the FBI has asked the court for two weeks.
  • Unlikely it comes about that the FBI caught Farouk gaining the password to any account with a surveillance camera or found it on a piece of paper attached to the monitor.
  • It is doubtful that the FBI decided to use the power of the supercomputers of the NSA to crack the password by brute force — there is no guarantee that it will cope for two weeks.
  • All sorts of experimental, previously untested methods of hacking are also discarded. They are too time-consuming — two weeks is not enough and there is no guarantee that the iPhone chip will not be damaged in the process.

How the FBI is likely to be to hack iPhone terrorist

As mentioned literary character Conan Doyle, aside from all the incredible, then the remaining explanation would be the only correct one. According to the researcher — and his conclusion he makes based on his own experience and discussions within the community of professionals in the field of security — the FBI with the help of outside experts will go the other way.

Read also:   Sales of Mac computers fell again

In his opinion the FBI the selected method must be sufficiently well studied theoretically, and its practical implementation should not take longer than two weeks. If we reject everything that doesn’t fit, then still rather primitive, but theoretically very effective way of backing up the NAND chip that contains information (NAND mirroring).

Simply put, the FBI (or rather unknown till consultants) will copy the contents of the iPhone terrorist and try not to hack the original and the copy. If the mode data destruction — the FBI still, she can make another copy, another thousand copies to 20 000 copies. In fact, it’s like trying to pass the game using “save” — if something went wrong, you can always press a couple of buttons and “revert” back.

Delving into technical details, it describes another method that will significantly speed up the process — the FBI will need to copy only a part of the NAND chip. But we’ll leave that aside, because fundamentally it is not different from the first.

The expert stressed that in newer smart phones this method may not work, since Apple has closed the possibility of such “games” with the contents of the device by a technology called Secure Enclave. In addition, it would not work, if Syed Farooq chose to protect your iPhone 5c is not a 4-digit password, and the password with numbers and letters — the FBI would take years for him to pick up.

Finally, it should be said that the suggested method impossible to implement quick-and-dirty, need serious resources — specific equipment and specific knowledge. According to some reports, you can also tell that the help of the FBI came from outside the USA. Now all I wonder who had a helping hand. And on what terms.

Read also:   iPhone 7 in the new color "gloss black" appeared on the photos ahead of announcement

Leave a Reply

Your email address will not be published. Required fields are marked *