DaveB answered my question - just ignore me.
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
No likey no unlocky
Collapse
X
-
-
Can't they put the imaged disk into another phone and use that to enter a PIN?Originally posted by DaveB View PostThey are saying they wont do what the FBI have asked them to do. Imaging the disk wont work in any case as it required the OS on the imaged disk to have access to the encryption key in combination with the PIN number being entered. The OS has to be "live" for it to work and if it's live it will erase the data after 10 failed attempts.
Other disk encryption solutions *may* be hackable through attacking the image but the way Apple has implemented it mean it's not possible.
Rinse and repeat until the 10,000th guess works
(although I assume they can't else they would have tried it)Originally posted by Stevie Wonder BoyI can't see any way to do it can you please advise?
I want my account deleted and all of my information removed, I want to invoke my right to be forgotten.Comment
-
I asked the same. Then I read the links.Originally posted by BrilloPad View PostSo why can't someone take a copy of that data by copying to another drive? Then try the passcode on that.
Apologies if that is a stupid question.....
AIUI The pin is processed by a cpu that has a random UID hard wired into it. If the pin is correct, the cpu releases a AES key (comprising a hash of the pin and the UID) that can be used to decrypt the data. The cpu must be running for any of this to work. Hence offline attacks are out. The cpu microcode will forget the pin (or rather the hash) after ten attempts. The AES key is too strong for a brute force attack on the data to work within a reasonable time.Down with racism. Long live miscegenation!Comment
-
So what I have learned, is, if I see someone wearing the usual Muslim attire, carrying a large bag that might contain guns or a bomb, who is holding an iPhone, it's probably best to be some place else.Comment
-
The 9-11 hijackers didn't wear whatever you might think of as Muslim attire, didn't carry large bags, and didn't have iPhones. Other than that…Originally posted by DimPrawn View PostSo what I have learned, is, if I see someone wearing the usual Muslim attire, carrying a large bag that might contain guns or a bomb, who is holding an iPhone, it's probably best to be some place else.Comment
-
Originally posted by NickFitz View PostAs explained in the articles I linked to above, the device's data is encrypted with an AES key that is not accessible other than via the passcode, or Touch ID on hardware capable of that.I imagine if they manage to clone the drive (or a portion of the drive) they can brute force the key because they won't need to worry about it deleting the data.
Oh wait nope, I was wrong, brute forcing would take until the heat death of the universe.
However, if they can clone the drive, they can just try every combination and reclone it back if it wipes itself (to the same device). Unless the key is stored on some internal flash memory that you can't get to, I suppose.Last edited by NibblyPig; 17 February 2016, 12:59.Unless you're the lead dog, the scenery never changes.
Currently 10+ contracts available in your areaComment
-
Not flash memory, in a dedicated encryption CPU, with it's own hardwired access paths.Originally posted by NibblyPig View PostI imagine if they manage to clone the drive (or a portion of the drive) they can brute force the key because they won't need to worry about it deleting the data.
Oh wait nope, I was wrong, brute forcing would take until the heat death of the universe.
However, if they can clone the drive, they can just try every combination and reclone it back if it wipes itself (to the same device). Unless the key is stored on some internal flash memory that you can't get to, I suppose."Being nice costs nothing and sometimes gets you extra bacon" - Pondlife.Comment
-
I don't think they were worried about someone hacking their phone when they "landed"Originally posted by NickFitz View PostThe 9-11 hijackers didn't wear whatever you might think of as Muslim attire, didn't carry large bags, and didn't have iPhones. Other than that…Comment
-
So despite the fact that nothing you originally posted held true, you are still trying to stick to your grubby little racist stereotyping?Originally posted by DimPrawn View PostI don't think they were worried about someone hacking their phone when they "landed""Being nice costs nothing and sometimes gets you extra bacon" - Pondlife.Comment
-
Ah, it seems this is quite an old phone (5C), so doesn't have much of the latest encryption hardware: Errata Security: Some notes on Apple decryption San Bernadino phone
So it may, just possibly, be feasible for Apple to get it to unlock with a special software update. Which explains why they're challenging the court order (which, BTW, the order itself explicitly says they can do) but haven't said it's impossible for them to comply, which would probably be the case with a more recent phone.Comment
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- How to land a temporary technology job in 2026 Today 07:01
- Spring Forecast 2026 ‘won’t put up taxes on contractors’ Yesterday 07:26
- Six things coming to contractors in 2026: a year of change, caution and (maybe) opportunity Jan 7 06:24
- Umbrella companies, beware JSL tunnel vision now that the Employment Rights Act is law Jan 6 06:11
- 26 predictions for UK IT contracting in 2026 Jan 5 07:17
- How salary sacrifice pension changes will hit contractors Dec 24 07:48
- All the big IR35/employment status cases of 2025: ranked Dec 23 08:55
- Why IT contractors are (understandably) fed up with recruitment agencies Dec 22 13:57
- Contractors, don’t fall foul of HMRC’s expenses rules this Christmas party season Dec 19 09:55
- A delay to the employment status consultation isn’t why an IR35 fix looks further out of reach Dec 18 08:22

Comment