"...Apple said it was planning an iPhone software update that would effectively disable the phone’s charging and data port — the opening where users plug in headphones, power cables and adapters — an hour after the phone is locked. While a phone can still be charged, a person would first need to enter the phone’s password to transfer data to or from the device using the port. Such a change would hinder law enforcement officials, who have typically been opening locked iPhones by connecting another device running special software to the port, often days or even months after the smartphone was last unlocked..." https://www.nytimes.com/2018/06/13/technology/apple-iphone-police.html
Cops Are Confident iPhone Hackers Have Found a Workaround to Apple’s New Security Feature “Grayshift has gone to great lengths to future proof their technology and stated that they have already defeated this security feature in the beta build.” June 14, 2018 https://motherboard.vice.com/en_us/...d-a-workaround-to-apples-new-security-feature
"iPhone Hackers May Already Have a Workaround for Cops to Crack Apple's Newest Security Feature... ...Now, the companies that work with law enforcement have responded, and they’re pretty sure they already have a workaround. Motherboard reported the makers of hacking tools designed to bypass Apple’s encryption and allow unauthorized persons to view the content of an iPhone are already pitching their technology as a way to defeat Apple’s yet-to-be-publicly-released security features... In an email obtained by Motherboard, a forensic expert meeting with digital forensic firm Grayshift said the company 'stated that they have already defeated this security feature in the beta build.'..." https://gizmodo.com/iphone-hackers-may-already-have-a-workaround-for-cops-t-1826851897
A lot of Law Enforcement officials refuse to acknowledge that law enforcement is hard work, and that there is no room for fascism in law enforcement. There is no need for backdoors if they are just diligent about doing their jobs. They prefer the easy button. If you are not up to the task, step aside and let someone else do your job. We will stifle cellebrite and greykey privacy invaders. I would strongly recommend, that you disable touch id to unlock your iPhone, and then change your passcode to an alphanumeric passcode comprised of letters and numbers. One of the main reasons why the offerings of greykey and cellebrite are dangerous is because it's not a matter of if, it's a matter of when criminals will get their hands on these tools. Furthermore, there is always the potential that LEAs will misuse these tools, for many reasons.
Stephanie K. Pell (2016) You Can’t Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era? https://scholarship.law.unc.edu/cgi/viewcontent.cgi?article=1306&context=ncjolt (PDF)
It is some kind of nonsense to believe this was ever a hack. It is clearly a feature designed by Apple in collaboration with government to bypass the illusion of security they peddle to their customers.
You could be right, because the fix in IOS 12 gives them 1 hour to use the tool to unlock the iPhone. Why not make the tool unusable immediately after someone locks their iPhone? hmm Apple. It is starting to seem more clear that Apple is slapping its users in the face. Why not increase the iterations and assure that you can't get past them with ANY tools? It's only a matter of time before this hack is copied, and able to be simulated by script kiddies. Apple should be ashamed of themselves for allowing this.
Apple’s iOS 12 reportedly blocks Grayshift’s passcode-cracking hack October 24, 2018 https://venturebeat.com/2018/10/24/...dly-blocks-grayshifts-passcode-cracking-hack/
Good for them! I gotta say. Apple keeps looking better and better from a security/privacy perspective It's just too bad that their stuff costs so much, and is so hard to repair
Until the next hack is found, however, hopefully Apple will put a lid on this kind of stuff, or, the other alternative is, they come clean.