OT: F**k Apple

If you look at personal data records you'll find they are very inaccurate, and contain conclusions that are simply careless. Junk data in, junk logic and junk data out. Unfortunately the latter can easily be destructive.

NT

Reply to
tabbypurr
Loading thread data ...

I would suggest washing out the flash chip with warm mercury or some other low melting point metal.

Reply to
sean.c4s.vn

Cannot perform supercomputer brute force on the phone itself, but most certainly CAN do so if the datagram has been extracted.

Reply to
DecadentLinuxUserNumeroUno

No need to "read the key". The datagram is what you are hacking at.

Reply to
DecadentLinuxUserNumeroUno

Nice try, punk.

I have had "no credit trail" for decades and am on exactly ZERO lists.

I was, in fact being vetted by no less than 6 agencies a year.

You "know" exactly NOTHING about it.

Reply to
DecadentLinuxUserNumeroUno

Any 14 year old hobbyist can "desolder the flash chip". What you then have is a chip full of data that is indistinguishable from random by any practical method known.

The key is held on-chip within the ARM CPU "secure enclave" and is expressly designed to be extremely hard to extract.

Too hard for the FBI and any other hacker to date it would seem.

--

John Devereux
Reply to
John Devereux

They should just hand the phone over to Apple and let them extract whatever the hell it is they're after. There's absolutely no real requirement for Apple to deliver up a new bios for them to use any way they please...

Reply to
bloggs.fredbloggs.fred

Home-grown 'events' in the US allready surpass anything recorded in Europe. They are just less news-worthy, for that reason.

RL

Reply to
legg

For the ignorati...

brought to you by an old fart and Luddite whose cellphone has no GPS or flash ;-) ...Jim Thompson

--
| James E.Thompson                                 |    mens     | 
| Analog Innovations                               |     et      | 
| Analog/Mixed-Signal ASIC's and Discrete Systems  |    manus    | 
| San Tan Valley, AZ 85142     Skype: skypeanalog  |             | 
| Voice:(480)460-2350  Fax: Available upon request |  Brass Rat  | 
| E-mail Icon at http://www.analog-innovations.com |    1962     | 
              
I love to cook with wine.     Sometimes I even put it in the food.
Reply to
Jim Thompson

And this...

...Jim Thompson

--
| James E.Thompson                                 |    mens     | 
| Analog Innovations                               |     et      | 
| Analog/Mixed-Signal ASIC's and Discrete Systems  |    manus    | 
| San Tan Valley, AZ 85142     Skype: skypeanalog  |             | 
| Voice:(480)460-2350  Fax: Available upon request |  Brass Rat  | 
| E-mail Icon at http://www.analog-innovations.com |    1962     | 
              
I love to cook with wine.     Sometimes I even put it in the food.
Reply to
Jim Thompson

Other than Oklahoma City... what, in recent years, comes even close? ...Jim Thompson

--
| James E.Thompson                                 |    mens     | 
| Analog Innovations                               |     et      | 
| Analog/Mixed-Signal ASIC's and Discrete Systems  |    manus    | 
| San Tan Valley, AZ 85142     Skype: skypeanalog  |             | 
| Voice:(480)460-2350  Fax: Available upon request |  Brass Rat  | 
| E-mail Icon at http://www.analog-innovations.com |    1962     | 
              
I love to cook with wine.     Sometimes I even put it in the food.
Reply to
Jim Thompson

Another proper answer.

The retards at Apple should be offering this very solution as I am quite sure *they* have a back door.

Reply to
DecadentLinuxUserNumeroUno

You'll stay ignorati after reading that misinformational crap- it's wrong on every point.

Reply to
bloggs.fredbloggs.fred

Non sequitur.

Reply to
ssinzig

Further evidence that this is a political gambit to codify into law backdoors and by extension warrantless wiretapping of a ALL encrypted communications between individuals --

formatting link

S.

Reply to
ssinzig

LOL- and do you think Apple's legal counsel is coming from "Better Call Saul"?!? Too funny...

Reply to
bloggs.fredbloggs.fred

They are asking Apple to make a tool that doesn't exist and Apple doesn't w ant such a tool to ever exist.

And it is naive to think it would be a one time thing, if they say yes this time it'll soon be every agency, Hollywood, governments around the world that wa nts Apple to crack phones

-Lasse

Reply to
Lasse Langwadt Christensen

It's not an easily Googled subject, as the use of firearms is probably irrelevent, unless that's your interest.

formatting link

Obviously, if you get more than one weapon-carrier operating on the same day, the numbers can add up. I'm not sure that's relevent either, as Kool-Aid, faulty gas tanks, or chemicals can do just as good a job, singley or otherwise and the justification behind 'events' can be pretty 'Catholic' in scope.

RL

Reply to
legg

Yeah, that's what I was thinking too. The government is trying to break the encryption through the operating system, which was designed to prevent brute force attacks. Can't they remove the Flash, extract the contents, and decipher it?

Reply to
sms

You misspelled zequitur.

Reply to
DecadentLinuxUserNumeroUno

ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.