- Joined
- Feb 24, 2008
- Messages
- 18,214
- Reaction score
- 31,449
I'll admit I jumped into this thread without really reading into this specific case, and the more I learn about it, the harder it is for me to stick up for apple.
With that said, there seems to be some confusion (even within this very thread) as to whether or not apple actually currently has the capability to do what the government is asking them to do.
Is the government simply telling them to unlock one particular phone? Or are they forcing apple to develop a way to break into any iPhone?
I dunno, call me a tin foil hat wearing nut case if you'd like, but I'd be willing to bet the government wanting access to this particular iPhone actually has very little to do with this specific case.
Supposedly, it's currently not possible.
What is the Government asking for?
The FBI wants to examine the iPhone used by Syed Farook to determine wheter he and his wife, Tashfeen Malik, had planned the shooting directly with the Islamic State. The iPhone, a 5C version of the smartphone release in 2013, is locked by a passcode, which the FBI wants to circumvent. Apple would have to build a new version of its iOS software that allows the FBI to bypass certain restrictions. Apple claims the change to their software can give someone "the potential to unlock any iPhone in someone's physical possession."
So what does the court order require Apple to do?
The court is ordering the company to "bypass or disable" a feature that automatically wipes an iPhone clean of all its data after 10 incorrect password attempts have been entered. This is a standard feature on iPhones.
Technically, that would not require Apple to decrypt the passcode that blocks access by outsiders to the iPhone. It would allow the Government (and anyone else) to try an unlimited number of passwords with fear of the phone erasing all of its stored information.
In electronic security parlance, that is what is called a "brute force" attack, and all it takes is time and patience to submit a large number of passcodes. Brute force attacks are usually carried out with the assitance of a powerful comptuter, which can automatically input millions of different passwords combinations until the correct code is entered.
It would be only a matter of time before the phone security software is hacked. It works now because there is no back door.