It isn't that hard to figure out how Cellebrite's hardware works
ryacko at gmail.com
Fri May 4 17:20:05 PDT 2018
"And that’s what companies like Cellebrite and Grayshift do. They sell
devices that break device security—not by breaking the encryption on the
device—but by finding flaws in implementation."
Somehow Cellebrite's tools work around rate limits. This implies either the
rate limit is on the secure enclave, which can be overwritten, or the rate
limit is not enforced by the secure enclave. So obviously there must be
some mechanism that forces the creation of a rate limit.
Obviously the whole issue is a matter of more research and
Although this whole argument seems to be against certificate authorities
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 998 bytes
Desc: not available
More information about the cypherpunks