If you look at personal data records you'll find they are very inaccurate, and contain conclusions that are simply careless. Junk data in, junk logic and junk data out. Unfortunately the latter can easily be destructive.
NT
If you look at personal data records you'll find they are very inaccurate, and contain conclusions that are simply careless. Junk data in, junk logic and junk data out. Unfortunately the latter can easily be destructive.
NT
I would suggest washing out the flash chip with warm mercury or some other low melting point metal.
Cannot perform supercomputer brute force on the phone itself, but most certainly CAN do so if the datagram has been extracted.
No need to "read the key". The datagram is what you are hacking at.
Nice try, punk.
I have had "no credit trail" for decades and am on exactly ZERO lists.
I was, in fact being vetted by no less than 6 agencies a year.
You "know" exactly NOTHING about it.
Any 14 year old hobbyist can "desolder the flash chip". What you then have is a chip full of data that is indistinguishable from random by any practical method known.
The key is held on-chip within the ARM CPU "secure enclave" and is expressly designed to be extremely hard to extract.
Too hard for the FBI and any other hacker to date it would seem.
-- John Devereux
They should just hand the phone over to Apple and let them extract whatever the hell it is they're after. There's absolutely no real requirement for Apple to deliver up a new bios for them to use any way they please...
Home-grown 'events' in the US allready surpass anything recorded in Europe. They are just less news-worthy, for that reason.
RL
For the ignorati...
brought to you by an old fart and Luddite whose cellphone has no GPS or flash ;-) ...Jim Thompson
-- | James E.Thompson | mens | | Analog Innovations | et | | Analog/Mixed-Signal ASIC's and Discrete Systems | manus | | San Tan Valley, AZ 85142 Skype: skypeanalog | | | Voice:(480)460-2350 Fax: Available upon request | Brass Rat | | E-mail Icon at http://www.analog-innovations.com | 1962 | I love to cook with wine. Sometimes I even put it in the food.
And this...
...Jim Thompson
-- | James E.Thompson | mens | | Analog Innovations | et | | Analog/Mixed-Signal ASIC's and Discrete Systems | manus | | San Tan Valley, AZ 85142 Skype: skypeanalog | | | Voice:(480)460-2350 Fax: Available upon request | Brass Rat | | E-mail Icon at http://www.analog-innovations.com | 1962 | I love to cook with wine. Sometimes I even put it in the food.
Other than Oklahoma City... what, in recent years, comes even close? ...Jim Thompson
-- | James E.Thompson | mens | | Analog Innovations | et | | Analog/Mixed-Signal ASIC's and Discrete Systems | manus | | San Tan Valley, AZ 85142 Skype: skypeanalog | | | Voice:(480)460-2350 Fax: Available upon request | Brass Rat | | E-mail Icon at http://www.analog-innovations.com | 1962 | I love to cook with wine. Sometimes I even put it in the food.
Another proper answer.
The retards at Apple should be offering this very solution as I am quite sure *they* have a back door.
You'll stay ignorati after reading that misinformational crap- it's wrong on every point.
Non sequitur.
Further evidence that this is a political gambit to codify into law backdoors and by extension warrantless wiretapping of a ALL encrypted communications between individuals --
S.
LOL- and do you think Apple's legal counsel is coming from "Better Call Saul"?!? Too funny...
They are asking Apple to make a tool that doesn't exist and Apple doesn't w ant such a tool to ever exist.
And it is naive to think it would be a one time thing, if they say yes this time it'll soon be every agency, Hollywood, governments around the world that wa nts Apple to crack phones
-Lasse
It's not an easily Googled subject, as the use of firearms is probably irrelevent, unless that's your interest.
Obviously, if you get more than one weapon-carrier operating on the same day, the numbers can add up. I'm not sure that's relevent either, as Kool-Aid, faulty gas tanks, or chemicals can do just as good a job, singley or otherwise and the justification behind 'events' can be pretty 'Catholic' in scope.
RL
Yeah, that's what I was thinking too. The government is trying to break the encryption through the operating system, which was designed to prevent brute force attacks. Can't they remove the Flash, extract the contents, and decipher it?
You misspelled zequitur.
ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.