Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Wednesday February 17 2016, @11:29AM   Printer-friendly
from the well-this-is-a-bit-scary dept.

Judge Orders Apple to Unlock iPhone Belonging to San Bernardino Shooter

Apple has been ordered to assist in the unlocking of an iPhone belonging to one of the San Bernardino shooters. This may require updating the firmware to bypass restrictions on PIN unlock attempts:

Apple must assist the FBI in unlocking the passcode-protected encrypted iPhone belonging to one of the San Bernardino shooters in California. US magistrate Sheri Pym says Cupertino must supply software that prevents the phone from automatically annihilating its user data when too many password attempts have been made.

The smartphone belonged to Syed Farook, who with his wife Tashfeen Malik shot and killed 14 coworkers on December 2. The couple died in a gun battle with police soon after. Cops have been unable to access Syed's iPhone 5C because they do not know the correct PIN, and will now gain the assistance of Apple, as ordered by Judge Pym [PDF] on Tuesday.

iOS 8 and above encrypts data on devices, requiring a four to six-digit PIN to unlock. After the first few wrong guesses, iOS waits a few minutes between accepting further PIN entry attempts, escalating to an hour's delay after the ninth failed login.

[...] Judge Pym wants Apple to come up with some magic software – perhaps a signed firmware update or something else loaded during boot-up – that will allow the FBI to safely brute-force the PIN entry without the device self-destructing. This code must only work on Farook's phone, identified by its serial numbers, and no other handset. The code must only be run on government or Apple property, and must not slow down the brute-forcing process.

Apple has five days to appeal or demonstrate that it cannot comply with the order. It is crucial to note that the central district court of California has not instructed Apple to crack its encryption – instead it wants Apple to provide a tool to effectively bypass the unlocking mechanism. "It's technically possible for Apple to hack a device's PIN, wipe, and other functions. Question is can they be legally forced to hack," said iOS security expert Jonathan Ździarski.

Apple Ordered to Aid FBI in Unlocking Shooter's iPhone

According to this Reuters article, "A U.S. judge on Tuesday ordered Apple Inc to help the FBI break into a phone recovered from one of the San Bernardino shooters, an order that heightens a long-running dispute between tech companies and law enforcement over the limits of encryption.

Apple must provide "reasonable technical assistance" to investigators seeking to unlock the data on an iPhone 5C that had been owned by Syed Rizwan Farook, Judge Sheri Pym of U.S. District Court in Los Angeles said in a ruling."

"...Forensics expert Jonathan Zdziarski said Tuesday Apple might have to write custom code to comply with the order, presenting a novel question to the court about whether the government could order a private company to hack its own device.

Zdziarski said that because the San Bernardino shooting was being investigated as a terrorism case, investigators would be able to work with the NSA and CIA on cracking the phone. Those U.S. intelligence agencies likely could break the iPhone's encryption without Apple's involvement, he said."

Update: EFF to file an amicus brief in support of Apple's position.

Update 2: mendax writes: The New York Times has some "breaking news" which says that Apple will not comply with the judge's order. It's a good way to get in trouble with the judge but it's the right decision on Apple's part.

Previously: FBI Unable to Decrypt California Terrorists' Cell Phone


Original Submission #1Original Submission #2

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by gnuman on Wednesday February 17 2016, @04:56PM

    by gnuman (5013) on Wednesday February 17 2016, @04:56PM (#305842)

    Oh, I'm sorry. But maybe you should realize that typical 12-character passwords are just as weak as 4 or 6 digit PINs, unless you put a limit on retries. So unless someone writes 20-character passphrases that are not in some rainbow table, if allowed to just dump these things out out of the device. This is the Achilles Heel of all password protected crypto, be it LUKS or TrueCrypt.

    Now, I will repeat myself. It is completely asinine to put a limit of

    Even farm it out to the cloud and spend $100K to get it done in a day.

    That statement is idiocracy. You have no clue what is the complexity of the problem, yet you somehow pull this number out of your ass. And as I said, it costs *nothing* to lookup a rainbow table to even to brute force all typical passwords. As to how much it would cost to brute force this particular password given unlimited retries?? No one knows except the person that knows the password. It could be negligible or it could be completely unattainable. Saying "spend $100 and get it done in a day" is just completely ignorant.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Wednesday February 17 2016, @05:38PM

    by Anonymous Coward on Wednesday February 17 2016, @05:38PM (#305857)

    > Now, I will repeat myself. It is completely asinine to put a limit of

    Never said it was a "limit" it was an example.

    But I shouldn't be surprised that you've never heard of the principle of charity and instead decided to pick the worst possible interpretation so you could belittle another person.

  • (Score: 2) by frojack on Wednesday February 17 2016, @08:34PM

    by frojack (1554) Subscriber Badge on Wednesday February 17 2016, @08:34PM (#305925) Journal

    Exactly.

    Since whatever you guess the pin might be has to be tried EACH time on the device, the real protection is the limit and the rate.

    How long it takes to try each pin on some remote computer doesn't matter.

    However, if you could clone the phone's entire internal storage you could replicate that to the cloud and just try to brute force the encryption itself. You will know when you have hit THE key (as opposed to some possible key) because there will be recognizable data structures that appear on ALL iphones. When you know significant portions of what is expected, determining when you have the actual key is not that hard, and trying them all becomes a solvable task. They ought to be done in 4 or 9 years.

    --
    No, you are mistaken. I've always had this sig.
    • (Score: 2) by gnuman on Thursday February 18 2016, @06:19AM

      by gnuman (5013) on Thursday February 18 2016, @06:19AM (#306190)

      However, if you could clone the phone's entire internal storage you could replicate that to the cloud and just try to brute force the encryption itself

      Well, no, actually you can't. Unless there is some unknown hidden attack on symmetric crypto, you can't just brute force your way through keys like this.

      http://stackoverflow.com/questions/18847580/aes128-vs-aes256-using-bruteforce/28516055 [stackoverflow.com]

      You can check 1e15 (1,000,000,000,000,000) combinations reasonably quickly. So 56-bit DES or 64-bit is completely insecure and have been for decades. I don't know what Apple is using, but it is at least 128-bit crypto, probably 256-bit. This means that if you can brute force a 56-bit key in one millisecond, it would take you longer than the age of the universe to crack 128-bit key, never mind 256-bit key.

      The bottom line is this - crypto is either secure or insecure. Any backdoor makes crypto insecure. If Apple added a super-secret-hash-hash key so they could unlock the phone, that key would be completely compromised sooner rather than later along with ALL the devices. Such a key would be immediately attacked and extracted from the phone by uncovering the chip and extracting the key, bit by bit from the flash, or by compromising Apple or government servers. There is nothing that can't be unlocked like that, given sufficient time and resources. This also means that this entire fiasco with the phone has nothing to do with the phone itself - Apple can't unlock it even if they wanted to and FBI doesn't want to spend resources (that it can't afford anyway) to find nothing on that phone. What this is about is future of security - it's the next installment of the crypto wars.

      https://en.wikipedia.org/wiki/Crypto_Wars [wikipedia.org]

      • (Score: 2) by frojack on Thursday February 18 2016, @09:10AM

        by frojack (1554) Subscriber Badge on Thursday February 18 2016, @09:10AM (#306237) Journal

        This means that if you can brute force a 56-bit key in one millisecond, it would take you longer than the age of the universe to crack 128-bit key, never mind 256-bit key.

        Did you miss that bit about the cloud, and the other references about using the power of a zillion machines metioned up-thread?

        By the way, if you think encryption can't be brute forced in this day and age, you need to go back and re-read what Snowden has written.

        --
        No, you are mistaken. I've always had this sig.