Click to Translate to English Click to Translate to French  Click to Translate to Spanish  Click to Translate to German  Click to Translate to Italian  Click to Translate to Japanese  Click to Translate to Chinese Simplified  Click to Translate to Korean  Click to Translate to Arabic  Click to Translate to Russian  Click to Translate to Portuguese  Click to Translate to Myanmar (Burmese)

PANDEMIC ALERT LEVEL
123456
Forum Home Forum Home > Off Topic Forum > Off Topic Discussion > Talk about anything
  New Posts New Posts RSS Feed - Hacking into the IPhone - they did it
  FAQ FAQ  Forum Search   Events   Register Register  Login Login

Tracking the next pandemic: Avian Flu Talk

Hacking into the IPhone - they did it

 Post Reply Post Reply
Author
Message
Medclinician View Drop Down
V.I.P. Member
V.I.P. Member
Avatar
Valued Member Since 2006

Joined: July 08 2009
Status: Offline
Points: 23322
Post Options Post Options   Thanks (0) Thanks(0)   Quote Medclinician Quote  Post ReplyReply Direct Link To This Post Topic: Hacking into the IPhone - they did it
    Posted: March 30 2016 at 7:40am
It is no great surprise that FBI -NSA (fill in the blanks many organization are in on this) finally found people who could get into Apple's phone past all the security and even hardware protection.

Although it is a question of necessity in terms of tracking terrorists it also makes all iPhones - the flagship product of Apple open to government spying.

There already is technology with radio waves to get into a computer that has no connection to the net. Over the 15 years since 911 any form of privacy on the net is history. This includes Facebook, Skype, and hundreds of communication sites which daily feed your private information to thousands of snoopers and it is even sold on the open market.

As for the iphone - it took a company outside the intelligence community to do it as it really will in terms of fighting the last battle on the cyber front where missiles can be launched, power grids taken down and we are under attack daily.

http://bgr.com/2016/03/22/apple-fbi-san-bernardino-iphone-how-hack-works/

As Ars Technica pointed out a few weeks ago, the FBI could dismantle the iPhone 5c in question. Then, with the help of acid and lasers, the Bureau would remove the outer layers of the iPhone’s processor and read the embedded ID, which is unique for each chip.

Once the ID is known, you can simply copy the encrypted storage to a different computer and use a brute force attack to attempt all PIN variations until you get the right combination.

This method is dangerous, as it can physically destroy the processor. If that were to happen, the data stored on the device would be gone for good.

The same site also proposed a different theory: jailbreaking the iPhone 5c. If a third-party company has found a secret bug inside SecureROM, the software that’s baked into the iPhone’s hardware and that is responsible for verifying that the device runs a genuine iOS version, then it could load custom software to bypass the PIN protection.

comment: Sigh. Get a clue. These are the days when little is safe and hackers work for money not for fun for the highest bidder. It has nothing to do with politics. It is economics and little computer guerrillas with nothing better to do today can sometimes far outstrip people whose job it is to protect us.

Good thinking. Hire separate people to do what they can't do.

What’s stopping the FBI from trying to guess each and every PIN combination until it gets the right one is the fact that the iPhone might be set to erase the data after the tenth wrong PIN input. Edward Snowden already suggested that the FBI has a memory mirroring technique at its disposal that could be used to beat the system.

What happens here is that the iPhone is again dismantled and the NAND memory module is removed so that it can be copied. With the help of software, the FBI can then try each and every PIN combination available. If the phone erases itself after the tenth attempt, the FBI would just restart the process. After all, it still has the original memory that can be copied over and over.

“This technique is kind of like cheating at Super Mario Bros. with a save-game, allowing you to play the same level over and over after you keep dying,” security researcher Jonathan Zdziarski wrote on his blog – you should read the entire post to better understand how this technique works.

The downside is that this method might be costly for the FBI, but that unspecified company willing to help out – likely for a hefty fee – could do it in a more efficient manner. This technique might also be the most reasonable way to break into an encrypted iPhone.

If that sounds too complex, just check out the following video, which explains the same technique from a different point of view. In it, intrepid “hackers” from China replace the 16GB memory chip on an iPhone with a 128GB chip for a fraction of the cost of a 128GB iPhone from Apple.

In the process, the hackers copy the entire contents of the 16GB memory module and move it over to the 128GB chip. That means that even the encryption keys are moved over, and you’d unlock that 128GB iPhone using the same PIN as before the “upgrade.”

comment: So it is no great mystery. Really Apple should hire data-miners  to simply search the net. That is what I have been doing for 15 years.

We discussed how they would finally pull this off and no one asked any of us for help. It really is time for people to wake up and smell the coffee. There are lot of veterans out there who instead of being spied on and harassed would be more than willing to help for little or next to nothing to protect their county.

Hint.

Medclinician

"not if but when" the original Medclinician
Back to Top
Medclinician View Drop Down
V.I.P. Member
V.I.P. Member
Avatar
Valued Member Since 2006

Joined: July 08 2009
Status: Offline
Points: 23322
Post Options Post Options   Thanks (0) Thanks(0)   Quote Medclinician Quote  Post ReplyReply Direct Link To This Post Posted: April 07 2016 at 9:45am
One feels they should approach the powers that be with a preliminary "With all due respect... Sir."

The real news

http://www.foxnews.com/tech/2016/04/07/fbi-director-says-government-purchased-tool-to-access-san-bernardino-gunmans-phone.html?intcmp=hpbt2


The spin

Fox's Hacking a Terrorist.

They did not hack the terrorist. They used an app which was developed for them by someone outside the system.

The Justice Department had only said that a third party had "demonstrated" an alternate method of unlocking the device to the FBI the evening before federal prosecutors filed a motion to delay a court hearing on the matter

Bottom line is Isis getting a lot better at this sort of thing and as I have said in many places, a major part of this conflict will be fought in Cyberspace.

We may have Anonymous which is saying "They" will go after IS but we have IS creating a whole new cyber army to escalate the war.



Being neither part of or supporting Anonymous nonetheless- the battle lines are being drawn. Nuclear weapons can be fired, power plants shut down, the banking systems put in havoc by infiltration of a world which has turned its back on putting things on paper and most of our information and knowledge is on vulnerable media.

We must exercise caution in terms of this "Anonymous". U.S. and other intelligence as well as other groups can easily put on a mask, and put up things on YouTube. I notice the content of this message is more revolutionary and vague. Yet these new Anonymous videos have a style and improved tech versus the Joker like mask of the past. Just remember that many so called terrorist operations have been found to be Intelligence operations in disguise as well as videos put out to rally support against terrorists. One thing that cannot be disputed is that with the correct virus, worm, or Enfold as I have described once - the power grid, defenses, and infrastructures of nations could be brought to their knees without firing a single bullet or missile.

Medclinician

posted April 2, 2016





"not if but when" the original Medclinician
Back to Top
 Post Reply Post Reply
  Share Topic   

Forum Jump Forum Permissions View Drop Down