FBI Opens San Bernardino Shooter’s iPhone; U.S. Drops Demand on Apple
Source: The Wall Street Journal
WASHINGTONThe Justice Department filed court papers Monday saying it had cracked the iPhone of a San Bernardino, Calif., terrorist, seeking to drop its legal case to force Apple Inc. to help them unlock it.
The move signals a temporary retreat from a high-stakes fight between Washington and Silicon Valley over privacy and security in the digital age.
The filing short-circuits a pending legal showdown over whether the government can force technology companies to write software to aid in criminal investigations, but it is unlikely to avert the long-term conflict between federal agents and technology executives over how secure electronic communications should be, and what firms should have to do to help the government access their customers data.
The decision by federal officials to drop the case comes a week after prosecutors bowed out of a planned courtroom showdown, telling the magistrate judge in the case that they may have found a new way to access the phone without Apples help.
Read more: http://www.wsj.com/articles/fbi-unlocks-terrorists-iphone-without-apples-help-1459202353
phazed0
(745 posts)The rest of the world is unlocking iPhones but the FBI can't. Do I see some budget cuts on the way?
truedelphi
(32,324 posts)Here is the scenario:
FBI agent brings home iPhone. Leaves it on his desk. mentions at dinner that no one knows how to get it opened.
His High School aged son or daughter thinks, "Cool. A free iPhone."
And minutes later, the UnLock has been accomplished!
Sophiegirl
(2,338 posts)But somebody just made a lot of money. You can be sure of that.
Raine1967
(11,589 posts)Your encryption is now worthless, and your phones are an open book to the FBI.
Apple - time for your coders to get back to work.
phazed0
(745 posts)Thanks to Snowden, we know it's been an open book this whole time. Encryption has been "broken" because the NSA has been implementing backdoors into encryption schemas and denying true encryption techniques since the early 90's. This is no accident. This is by design.
http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/
onehandle
(51,122 posts)But in the real world, for the casual user, iOS is still a much safer bet than other platforms.
phazed0
(745 posts)Not to start an Apple vs. Whatever thread or argue with ya.. but iOS and OSX, linux were the "most insecure" last year.
http://thehackernews.com/2015/02/vulnerable-operating-system.html
You can argue the reasoning or the metrics used in order to lay claim to that title, however, there were MORE vulnerabilities in iOS and OSX.
In the IT and hacker community, we know they are just computers in the end. They run CPU instruction sets and have a model of computing that can be traced back to the 60's. Apple didn't "invent" iOS or OSX. They are engineered on top of Unix and modified.
Apple has been operating their OS in obfuscation and obscurity. They keep their secrets and recurring services close to the chest (Which is why they are "limited" in many ways; walled garden, hideous DRM schemes) and they have enjoyed being the obscure OS in terms of market share (Which is good for advertising: "We don't get viruses" . They hold something like 8-9% of the computer market right now.. which is an all-time high... so the Virus program makers, prior to this, have been solely targeting the other 95-99% of computers as that is where the numbers are. Now that Apple has a considerable market share, malware authors are taking notice.
Guess which computer users DO NOT USE AN ANTIVIRUS because they were sold that idea. Apple users. Guess who knows this? Virus writers.
Just a few days ago:
Mac OS X Zero-Day Exploit Can Bypass Apple's Latest Protection Feature
With the release of OS X El Capitan, Apple introduced a security protection feature to the OS X kernel called System Integrity Protection (SIP). The feature is designed to prevent potentially malicious or bad software from modifying protected files and folders on your Mac.
The zero-day vulnerability (CVE-2016-1757) is a Non-Memory Corruption bug that allows hackers to execute arbitrary code on any targeted machine, perform remote code execution (RCE) or sandbox escapes, according to the researcher.
The most worrisome part is that the infection is difficult to detect, and even if users ever discover it, it would be impossible for them to remove the infection, since SIP would work against them, preventing users from reaching or altering the malware-laced system file.
Apple has patched the vulnerability, but only in updates for El Capitan 10.11.4, and iOS 9.3 that were released on 21st March.
Other versions do not appear to have a patch update for this specific vulnerability from Apple, meaning they are left vulnerable to this specific zero-day bug.
If you have Android, at least you have the option of "locking down" your device either with the built-in OS tools or 3rd party tools.
cprise
(8,445 posts)If it boots, then you can try to find weaknesses in the communication protocols of the device. That's why disk encryption only works for systems that are 'at rest' and won't boot without the key.
moonbabygo
(281 posts)I'll be interested to see what happens to Apple's stocks. Although, Apple could have cut a deal with the FBI, we will do it but give someone else the credit. Then again sometimes a cigar is just a cigar
Xithras
(16,191 posts)They most likely figured out a way to reset the attempt counter between iterations. That would allow them to brute force their way through the passcode pretty quickly.
secondwind
(16,903 posts)Facebook, etc.
I have nothing to hide, so I am not concerned.
TexasBushwhacker
(20,220 posts)Anyone who thinks any of their internet activity, e-mails or phone calls are truly private is dreaming. The main thing that keeps these things somewhat private is the shear volume.
jpak
(41,760 posts):Old DU FU smilie:
f
billhicks76
(5,082 posts)This was about setting precedents to allow average police into anyone's phone for any reason.
Sunlei
(22,651 posts)was something about cloning the info as many times as needed and cracking the password from clone information.?
Blue_Tires
(55,445 posts)A long, bloody court case is averted, Apple maintains their public image, and the FBI gets to continue their investigation...
Naturally Greenwald, Snowden and the rest of the Kremlin crowd are going apeshit on Twitter right now, instead of just being happy at the outcome...Hypocrites...