-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/10/2016 06:46 PM, Travis Biehn wrote:
This is all true.
It's a bit easier to attack, actually.
Yup, if the erasable "user selected" key can be read out then restored from backup after the OS erases it, no problem: A few days of careful tinkering with hardware, testing proofs of concept against /other/ iPhones, then a few minutes of automated attack against the /interesting/ iPhone. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJW4g3+AAoJEDZ0Gg87KR0L8LIQAJKA2FplSF7x+wpeQZmJPAi3 mnPGhBsZswrip5xyDv91EQxGwT3PUp0+LERCEM23YO1r9oimsq31PBNQBUn7B/NA jJS5+rTh2phseHLySYpHiTCpfrUMkUCLuNzUEiu6A4gHfGVM6SemtQLkICql1Ggw NEAxThXKcl3Syz5X/cDAJlSBeGR7JOvYRVmVD7XUxss01cVoenpRc9dlRM9Am8TR 5BS+hRkQn359JU+R7dCSm+zVoYqLVI2ui+gpp72+uLX1SbemxyJQz6RXKbEXfEjv zTKsUaBxNHe2EWcVsTXMBXYT55Ut3cwn2zUU4TKmaMbOEbguYF21KRAlWem2zHNj EpihLwjImR71zoW/uXfitbRv9r2c+ibMOUF2Am15j7Cs0iXPF+IASLzZW+74D5qt cHnyHQY52OD473xowgFpyaGs9lPBtDrTYFFuGqiZ+XazgLXIuepNe8iBDJypUDm0 f0gN7a0E4cvKodyPMfKbN213mY7pLW4CclZtTk+kYxocxslasT3palISsOqjs5LI jalMzTGfH57cAzvpDUxVix19dC63iBRbQVRkUJQMf7LQB+l7uSK1XtfpEw0kJB7T ww17VsOVQ7vq3FetoGywE3XugylKmRvPxjMGiLjt7go6tvf7okiu8dxhkbPGAJy4 SbPvrfoxYLWTDCZvdUz3 =rllm -----END PGP SIGNATURE-----