Unlocking iPhones: Cat and Mouse Continues

June 25, 2018

In a recent DarkCyber, referenced companies that specialize in unlocking iPhones for law enforcement. Apple responded by suggesting that it would alter the functionality of its lightning USB connector to provide greater user privacy.

At the security conference in Winston Salem, North Carolina, last week, I heard some talk about the issues that the Apple versus law enforcement cat and mouse game would create. (I gave two talks available to the 160 conference attendees. No boos and not thrown tomatoes.)

My impression of these comments is that the games will continue.

I was not surprised to read “A Hacker Figured Out How to Brute Force iPhone Passcodes.” Has the hacker kicked off a new round of game playing? Who knows?

The write up states:

A security researcher has figured out how to brute force a passcode on any up-to-date iPhone or iPad, bypassing the software’s security mechanisms… But Matthew Hickey, a security researcher and co-founder of cybersecurity firm Hacker House, found a way to bypass the 10-time limit and enter as many codes as he wants — even on iOS 11.3.

The method revealed in the write up is clever, like many hacks.

The write up quotes the hacker as saying, “I suspect others will find it [the hack] or have already found it.

Worth monitoring the score line.

Stephen E Arnold, June 25, 2018

Comments

One Response to “Unlocking iPhones: Cat and Mouse Continues”

  1. Donn Hrovat on July 31st, 2018 1:31 pm

    Hi , this is a helpful website , thank you for sharing

  • Archives

  • Recent Posts

  • Meta