Apple is fighting the FBI
-
@scottalanmiller said:
@Dashrender said:
So I suppose if you could disassemble the CPU and get to the storage chips that the secure enclave uses, you would have the key. I guess the chances of that happening currently without damaging said memory chips, is near impossible.
I guess that the difference is is that I am expecting that they have a process for this. I'm not certain that they do, but it seems likely to me that they do. Not cheap, not easy, not 100% reliable, but when needed, I bet that they can do it. And once they have done that, it seems that the rest just falls into place.
Who is they? you mean a state sponsor? I suppose.
I recall reading a year or more ago about this very thing.. some university was working on a way to get at information inside chips without destroying the function of the chip...
-
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
So I suppose if you could disassemble the CPU and get to the storage chips that the secure enclave uses, you would have the key. I guess the chances of that happening currently without damaging said memory chips, is near impossible.
I guess that the difference is is that I am expecting that they have a process for this. I'm not certain that they do, but it seems likely to me that they do. Not cheap, not easy, not 100% reliable, but when needed, I bet that they can do it. And once they have done that, it seems that the rest just falls into place.
Who is they? you mean a state sponsor? I suppose.
I recall reading a year or more ago about this very thing.. some university was working on a way to get at information inside chips without destroying the function of the chip...
Well, Israel, apparently.
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
-
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption... though they could get it much more easily because unlike the secure enclave, the desired data flowed out via either an API or just over the accessible pins.
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
-
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
-
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
-
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
-
@Dashrender said:
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
It's China, the payoffs probably got to be too much.
-
@travisdh1 said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
It's China, the payoffs probably got to be too much.
To who? the chinese government? What would suddenly change?
lol -
@Dashrender said:
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
"The rest of the world" might be a bit strong. I think you'll fine the US and EU to be the outliers here, not the mainstream.
-
@Dashrender said:
@travisdh1 said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
It's China, the payoffs probably got to be too much.
To who? the chinese government? What would suddenly change?
lolTalk to a business exec that deals with China. The payoffs keep getting a little larger each year till either the central government just takes over your business or it's no longer financially viable to keep doing business.
-
@scottalanmiller said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
"The rest of the world" might be a bit strong. I think you'll fine the US and EU to be the outliers here, not the mainstream.
What other first world is there?
originally I wrote "the rest of the world" but added first - because like you said.. only the first world really pays attention to this.
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
"The rest of the world" might be a bit strong. I think you'll fine the US and EU to be the outliers here, not the mainstream.
What other first world is there?
-
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
"The rest of the world" might be a bit strong. I think you'll fine the US and EU to be the outliers here, not the mainstream.
What other first world is there?
originally I wrote "the rest of the world" but added first - because like you said.. only the first world really pays attention to this.
Oh okay. Well as someone who likes to live outside of the first world....
The first world is a reference to the US specifically and its sphere of influence.
-
I'm moving to the second world in ONE WEEK!!
-
@scottalanmiller said:
I'm moving to the second world in ONE WEEK!!
Where's that? Also, do you already have citizenship in that country and how long did that take?
-
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@crustachio said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
@scottalanmiller said:
@Dashrender said:
the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.
Right, it's accessing it without iOS that I'm expecting.
the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..
That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.
Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.
It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...
And then walk away from the game due to ferocious litigation
How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.
The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.
Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.
That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?
"The rest of the world" might be a bit strong. I think you'll fine the US and EU to be the outliers here, not the mainstream.
What other first world is there?
originally I wrote "the rest of the world" but added first - because like you said.. only the first world really pays attention to this.
Oh okay. Well as someone who likes to live outside of the first world....
The first world is a reference to the US specifically and its sphere of influence.
That was kinda my point of including it.
-
@BBigford said:
@scottalanmiller said:
I'm moving to the second world in ONE WEEK!!
Where's that? Also, do you already have citizenship in that country and how long did that take?
Romania. No, not yet at least. This is our first venture there. But very strongly considering buying a home. But going to be hitting Moldova while there, considering both pretty heavily. In Greece right now (first world.) Have lived in Spain, Panama and Nicaragua over the past year.