FBI tries to make Apple to facilitate timely brute-force

Mike Duvos mpd at wolf359.net
Fri Feb 19 09:12:46 PST 2016


Of course, using 4 or 6 digit passcodes on the iPhone and then erasing
the encryption keys after 10 failed password attempts really isn't
security, so perhaps this is a bit too much drama over something
unimportant.

It's not like the FBI can't mirror the encrypted filesystem without
booting the phone, and then play with it in the laboratory and hack to
their hearts content, on much faster processors.

Only a password long enough that it can't be brute forced provides any
real security, and it will be interesting to see if the terrorists
cared enough to employ this option, or were lazy and just used a PIN
number.

I therefore suspect this case is about whether the government can
force a company to write special software to assist in an
investigation.  In this particular case, 75% of the public is on the
side of the government, and it's an excellent opportunity to push the
envelope in the direction of obstructing the free use of strong
encryption.

I wouldn't be surprised if the NSA has already cracked the phone, and
this is all just contrived security theater.

-- 
Mike Duvos
mpd at wolf359.net







On Wed, Feb 17, 2016 at 5:10 AM, Henry Rivera <4chaos.onelove at gmail.com> wrote:
> http://www.theguardian.com/us-news/2016/feb/17/apple-ordered-to-hack-iphone-of-san-bernardino-shooter-for-fbi



More information about the cypherpunks mailing list