Attention

The opinions expressed by columnists are their own and do not represent our advertisers

Wednesday, March 30, 2016

FBI hack may raise questions about iPhone security

The FBI has told a court that it was able to access data stored on an iPhone 5c running iOS 9

The FBI hack of an iPhone 5c running iOS 9 may have left the device just a little bit insecure in the eyes of some users, as the agency has not provided details of how it was able to access data on the phone used by the San Bernardino terrorist.

On Monday, the FBI told the court that the government had successfully accessed the data stored on the iPhone used by Syed Rizwan Farook and no longer required the assistance it was demanding in court from Apple.

More

3 comments:

Anonymous said...

Apple folded like a house of cards, and let them in or helped...

You can't hack a 128-bit encryption... There ins't enough computer power to do so currently... Unless they are using Quantum Mechanics type processors, but it was only speculated that google was developing one...

KBinLA said...

In the nefarious world of hackers plying their 'skillz', exploits are the tools of the trade. Exploits or 'sploits' are the leveraged use of errors in an application or operating system's code. They are used to circumvent security efforts in place within the apps or OS resulting in the take-over of the computer or router or phone or printer or EL grid controller or airplane or.., pretty much anything today. Once successfully applying the exploit the hacker effectively 'owns' or 'roots' the target machine becoming it's 'superuser'.
Within the exploits collection there is a group of them called 'Zero Day' expolits. These are known only to a very elite few, often just a single hacker and are a coveted tool.
Regarding the DOJ/Apple case, it's confirmed and admitted to by our gov't that it has a virtual toolbox full of Zero Days that they use to spy on you and me and the European leaders and ISIS., anyone. The courts have forced our gov't to reveal it's Vulnerabilities Equities Process (VEP), sharing of discovered exploits with the developers so as to correct the code error, and it's been deemed by the President that the policy [VEP] "...favors disclosure in almost all instances for widely used code."
That our gov't has refused to forwarded the method [the Zero Day exploit] used to access Farook's iPhone to Apple is simply one more overstep and one more lie and one more cover-up the establishment gov't is so, so infamously known for.
Folks, the pit that is our gov't is so deep and so dark as to even frighten Satan.

Anonymous said...

Apple its your move to show the public you are serious and we do not care about op ed letters to the editor.