Tim Cook: A Message to Our Customers

Discussion in 'privacy general' started by mirimir, Feb 17, 2016.

  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  2. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,080
    Location:
    DC Metro Area
  3. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,080
    Location:
    DC Metro Area
  4. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,080
    Location:
    DC Metro Area
    "Here’s how the FBI managed to get into the San Bernardino shooter’s iPhone

    The FBI partnered with an Australian security firm called Azimuth Security to gain access to an iPhone linked to the 2015 San Bernardino shooting, a new report from The Washington Post reveals...

    ...according to The Washington Post, the exploit was simple: Azimuth basically found a way to guess the passcode as many times as it wanted without erasing the phone, allowing the bureau to get into the phone in a matter of hours...

    The actual hacking was reportedly done by two Azimuth employees who gained access to the phone by exploiting a vulnerability in an upstream software module written by Mozilla. That code was reportedly used by Apple in iPhones to enable the use of accessories with the Lightning port...

    Once the hackers gained initial access, they were able to chain together two more exploits, which gave them full control over the main processor, allowing them to run their own code...

    After they had this power, they were able to write and test software that guessed every passcode combination, ignoring any other systems that would lock out or erase the phone..."

    https://www.theverge.com/2021/4/14/22383957/fbi-san-bernadino-iphone-hack-shooting-investigation
     
  5. zapjb

    zapjb Registered Member

    Joined:
    Nov 15, 2005
    Posts:
    5,559
    Location:
    USA still the best. But barely.
    Yeah I don't believe that. The 3letters paid that firm & got the results. I agree with that. Where I differ is I believe the 3letters already have access through backdoors to all iphones, Androids, Windows OS, ios. That the 3letters make a big show of paying these 3rd parties so they can deny they already have backdoor access.
     
  6. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    I hope you are wrong but I am NOT betting against you my friend!!
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.