ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Apple is fighting the FBI

    IT Discussion
    apple
    21
    229
    76.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender @scottalanmiller
      last edited by

      @scottalanmiller said:

      @Dashrender How does the secure enclave prevent the memory chips being imaged?

      it doesn't.

      But if you're talking about the memory chips that actually store the data that the secure enclave uses to store the encyption/decryption key - it's not that it in any way prevents you from doing that... but it's inside the CPU, and there are no APIs that exist to read those chips (chips inside chips?).

      So I suppose if you could disassemble the CPU and get to the storage chips that the secure enclave uses, you would have the key. I guess the chances of that happening currently without damaging said memory chips, is near impossible.

      So sure, you can get the standard flash/SSD chips from the phone, desolider them, connect them to a reader, pull the data off, and start applying 256 bit decryption codes to it...and we'll see how long that takes before you guess the right one.

      scottalanmillerS 2 Replies Last reply Reply Quote 0
      • BRRABillB
        BRRABill @scottalanmiller
        last edited by

        @scottalanmiller said:

        @Dashrender How does the secure enclave prevent the memory chips being imaged?

        Also, is the enclave tied to the drive?

        AKA: could they image the drive and just keep trying with new images, or does the enclave control the 10 attempts?

        scottalanmillerS DashrenderD 2 Replies Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @Dashrender
          last edited by

          @Dashrender said:

          So sure, you can get the standard flash/SSD chips from the phone, desolider them, connect them to a reader, pull the data off, and start applying 256 bit decryption codes to it...and we'll see how long that takes before you guess the right one.

          Well, they have some crazy equipment for that, so while not fast, likely faster than you are thinking.

          DashrenderD 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @Dashrender
            last edited by

            @Dashrender said:

            So I suppose if you could disassemble the CPU and get to the storage chips that the secure enclave uses, you would have the key. I guess the chances of that happening currently without damaging said memory chips, is near impossible.

            I guess that the difference is is that I am expecting that they have a process for this. I'm not certain that they do, but it seems likely to me that they do. Not cheap, not easy, not 100% reliable, but when needed, I bet that they can do it. And once they have done that, it seems that the rest just falls into place.

            DashrenderD 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @BRRABill
              last edited by

              @BRRABill said:

              @scottalanmiller said:

              @Dashrender How does the secure enclave prevent the memory chips being imaged?

              Also, is the enclave tied to the drive?

              AKA: could they image the drive and just keep trying with new images, or does the enclave control the 10 attempts?

              The enclave controls the attempts. But those are software attempts.

              1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @BRRABill
                last edited by

                @BRRABill said:

                @scottalanmiller said:

                @Dashrender How does the secure enclave prevent the memory chips being imaged?

                Also, is the enclave tied to the drive?

                AKA: could they image the drive and just keep trying with new images, or does the enclave control the 10 attempts?

                the drive has nothing to do with it.

                the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @Dashrender
                  last edited by

                  @Dashrender said:

                  the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                  Right, it's accessing it without iOS that I'm expecting.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • BRRABillB
                    BRRABill
                    last edited by

                    Maybe they should hire a psychic.

                    1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @scottalanmiller
                      last edited by

                      @scottalanmiller said:

                      @Dashrender said:

                      So sure, you can get the standard flash/SSD chips from the phone, desolider them, connect them to a reader, pull the data off, and start applying 256 bit decryption codes to it...and we'll see how long that takes before you guess the right one.

                      Well, they have some crazy equipment for that, so while not fast, likely faster than you are thinking.

                      Oh I know - the new facility in Utah is probably trying trillions or more options a second.

                      1 Reply Last reply Reply Quote 0
                      • DashrenderD
                        Dashrender @scottalanmiller
                        last edited by

                        @scottalanmiller said:

                        @Dashrender said:

                        So I suppose if you could disassemble the CPU and get to the storage chips that the secure enclave uses, you would have the key. I guess the chances of that happening currently without damaging said memory chips, is near impossible.

                        I guess that the difference is is that I am expecting that they have a process for this. I'm not certain that they do, but it seems likely to me that they do. Not cheap, not easy, not 100% reliable, but when needed, I bet that they can do it. And once they have done that, it seems that the rest just falls into place.

                        Who is they? you mean a state sponsor? I suppose.

                        I recall reading a year or more ago about this very thing.. some university was working on a way to get at information inside chips without destroying the function of the chip...

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @scottalanmiller
                          last edited by

                          @scottalanmiller said:

                          @Dashrender said:

                          the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                          Right, it's accessing it without iOS that I'm expecting.

                          the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @Dashrender
                            last edited by

                            @Dashrender said:

                            @scottalanmiller said:

                            @Dashrender said:

                            So I suppose if you could disassemble the CPU and get to the storage chips that the secure enclave uses, you would have the key. I guess the chances of that happening currently without damaging said memory chips, is near impossible.

                            I guess that the difference is is that I am expecting that they have a process for this. I'm not certain that they do, but it seems likely to me that they do. Not cheap, not easy, not 100% reliable, but when needed, I bet that they can do it. And once they have done that, it seems that the rest just falls into place.

                            Who is they? you mean a state sponsor? I suppose.

                            I recall reading a year or more ago about this very thing.. some university was working on a way to get at information inside chips without destroying the function of the chip...

                            Well, Israel, apparently.

                            1 Reply Last reply Reply Quote 1
                            • scottalanmillerS
                              scottalanmiller @Dashrender
                              last edited by

                              @Dashrender said:

                              @scottalanmiller said:

                              @Dashrender said:

                              the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                              Right, it's accessing it without iOS that I'm expecting.

                              the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                              That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.

                              DashrenderD 1 Reply Last reply Reply Quote 1
                              • DashrenderD
                                Dashrender @scottalanmiller
                                last edited by

                                @scottalanmiller said:

                                @Dashrender said:

                                @scottalanmiller said:

                                @Dashrender said:

                                the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                                Right, it's accessing it without iOS that I'm expecting.

                                the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                                That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.

                                Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.

                                It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption... though they could get it much more easily because unlike the secure enclave, the desired data flowed out via either an API or just over the accessible pins.

                                crustachioC 1 Reply Last reply Reply Quote 0
                                • crustachioC
                                  crustachio @Dashrender
                                  last edited by

                                  @Dashrender said:

                                  @scottalanmiller said:

                                  @Dashrender said:

                                  @scottalanmiller said:

                                  @Dashrender said:

                                  the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                                  Right, it's accessing it without iOS that I'm expecting.

                                  the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                                  That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.

                                  Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.

                                  It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...

                                  And then walk away from the game due to ferocious litigation

                                  DashrenderD 1 Reply Last reply Reply Quote 0
                                  • DashrenderD
                                    Dashrender @crustachio
                                    last edited by

                                    @crustachio said:

                                    @Dashrender said:

                                    @scottalanmiller said:

                                    @Dashrender said:

                                    @scottalanmiller said:

                                    @Dashrender said:

                                    the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                                    Right, it's accessing it without iOS that I'm expecting.

                                    the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                                    That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.

                                    Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.

                                    It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...

                                    And then walk away from the game due to ferocious litigation

                                    How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.

                                    The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.

                                    crustachioC 1 Reply Last reply Reply Quote 2
                                    • crustachioC
                                      crustachio @Dashrender
                                      last edited by crustachio

                                      @Dashrender

                                      @Dashrender said:

                                      @crustachio said:

                                      @Dashrender said:

                                      @scottalanmiller said:

                                      @Dashrender said:

                                      @scottalanmiller said:

                                      @Dashrender said:

                                      the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                                      Right, it's accessing it without iOS that I'm expecting.

                                      the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                                      That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.

                                      Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.

                                      It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...

                                      And then walk away from the game due to ferocious litigation

                                      How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.

                                      The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.

                                      Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.

                                      DashrenderD 1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender @crustachio
                                        last edited by

                                        @crustachio said:

                                        @Dashrender

                                        @Dashrender said:

                                        @crustachio said:

                                        @Dashrender said:

                                        @scottalanmiller said:

                                        @Dashrender said:

                                        @scottalanmiller said:

                                        @Dashrender said:

                                        the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                                        Right, it's accessing it without iOS that I'm expecting.

                                        the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                                        That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.

                                        Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.

                                        It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...

                                        And then walk away from the game due to ferocious litigation

                                        How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.

                                        The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.

                                        Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.

                                        That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?

                                        travisdh1T scottalanmillerS 2 Replies Last reply Reply Quote 0
                                        • travisdh1T
                                          travisdh1 @Dashrender
                                          last edited by

                                          @Dashrender said:

                                          @crustachio said:

                                          @Dashrender

                                          @Dashrender said:

                                          @crustachio said:

                                          @Dashrender said:

                                          @scottalanmiller said:

                                          @Dashrender said:

                                          @scottalanmiller said:

                                          @Dashrender said:

                                          the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                                          Right, it's accessing it without iOS that I'm expecting.

                                          the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                                          That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.

                                          Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.

                                          It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...

                                          And then walk away from the game due to ferocious litigation

                                          How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.

                                          The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.

                                          Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.

                                          That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?

                                          It's China, the payoffs probably got to be too much.

                                          DashrenderD 1 Reply Last reply Reply Quote 0
                                          • DashrenderD
                                            Dashrender @travisdh1
                                            last edited by

                                            @travisdh1 said:

                                            @Dashrender said:

                                            @crustachio said:

                                            @Dashrender

                                            @Dashrender said:

                                            @crustachio said:

                                            @Dashrender said:

                                            @scottalanmiller said:

                                            @Dashrender said:

                                            @scottalanmiller said:

                                            @Dashrender said:

                                            the secure enclave is the only thing that matters - and iOS tells the secure enclave to erase itself after 10 bad tries.

                                            Right, it's accessing it without iOS that I'm expecting.

                                            the problem with that is that the (and I'm guessing here) secure enclave won't respond to an attempt that's not signed by Apple's private key or some other key that would be unique - but I guess if that exists in iOS, then the FBI could extract that somehow..

                                            That's my guess. Pretty much, physical access always means that you can get to the data. It might be a huge pain, but I find it likely that they will find a way.

                                            Yep, and designers of chips will continue to try to find ways to make those breakdown solutions work.

                                            It's like the hackers who hacked Blu Ray players to get the key for blu ray encryption...

                                            And then walk away from the game due to ferocious litigation

                                            How funny - they talked about this on Security Now! a few weeks ago when this happened, and again this week.

                                            The developers of the software live in a different country/different laws from where Slysoft was - and the devs have stood up a new service for this project.

                                            Didn't know that. I was surprised to see that China-based DVDFab was abandoning plans to pursue next-gen Blu-Ray decryption as well.

                                            That is surprising... is the Chinese government actually considering joining the rest of the first world with regards to piracy?

                                            It's China, the payoffs probably got to be too much.

                                            To who? the chinese government? What would suddenly change?
                                            lol

                                            travisdh1T 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 7
                                            • 8
                                            • 11
                                            • 12
                                            • 6 / 12
                                            • First post
                                              Last post