Apple refuses to unlock San Bernardino terrorists phone for FBI investigation

The concern is once a back door is created it could be abused by the gov't and hackers on other phones.
Well, then, they need to come up with a way to access phones on an as-needed basis (court order) that wouldn't be a back door for general use.
 
I'm not trying to sound macabre, but can't they just use the terrorist's dead fingers to access the phone through itouch?
 
http://www.forbes.com/sites/josephs...-smartphone-fingerprint-readers/#6e2423161aa8


This said that hackers lift fingerprints from phones , could this been done the terrorists phone too?
That article was from a year ago; seems iPhone 6 is slightly better. While it's POSSIBLE to do it, in the below article it's likely that it won't work anyway. You need an almost exact clear replica. Fingerprints on phones (and most anywhere are usually smudged. But that all relies on what method the person used on the phone in question- fingerprint or pin code.

https://blog.lookout.com/blog/2014/09/23/iphone-6-touchid-hack/

The idea of an as-needed basis for a 'back door' is still a complex idea because I would think all iPhone 5c (or whatever iteration it is) all have the same basic OS and functioning underneath the hood. Even with something created for 'as-needed', once created it's going to be out there and there are people smart enough to take that and tweak it with extra code to make it work for them.

Hmm would be interesting though if there is a way to do that and a good thought :).
 
Social engineering is more than digging through the garbage. Look at the SecureID hack in 2011. They sent out phishing emails for a couple of days under the guise of a recruitment plan until a low level employee finally opened the .xls file that installed a back door through an adobe flash weakness. That hack cost them $66 million.
 
Social engineering is more than digging through the garbage. Look at the SecureID hack in 2011. They sent out phishing emails for a couple of days under the guise of a recruitment plan until a low level employee finally opened the .xls file that installed a back door through an adobe flash weakness. That hack cost them $66 million.
No matter how advanced computer security becomes, social engineering and the human element will always be a weak link in the security chain. There's always that one employee that can't resist....
 
They said the passcode was changed shortly after the terrorist died. Someone changed it and it wasnt the terrorists.
 
They said the passcode was changed shortly after the terrorist died. Someone changed it and it wasnt the terrorists.

Apple said it was federal government (FBI) changed it.
 
Yeah, the FBI is trying to pull a fast one.

I think they are trying to make it legal to do what they are illegally doing now.
 
I'm not trying to sound macabre, but can't they just use the terrorist's dead fingers to access the phone through itouch?

I don't think the terrorist's phone has biometric. probably an old one... they just need to get thru the 4-digits passcode.
 
I doubt this phone has anything on it anyway. It was his work phone and he made no attempt to destroy it like he did with his other phone and computer(s).
 
just found out that the terrorist's phone was iPhone 5C. definitely has no Touch ID.
 
Social engineering is more than digging through the garbage. Look at the SecureID hack in 2011. They sent out phishing emails for a couple of days under the guise of a recruitment plan until a low level employee finally opened the .xls file that installed a back door through an adobe flash weakness. That hack cost them $66 million.

yes phishing is part of social engineering methods. it's all about trying to find every bit of clue to use to trick people into telling them password. dumpster diving is part of it as well.

Adobe Flash.... *smh* I'm glad we finally phased it out and changing it to HTML5
 
just found out that the terrorist's phone was iPhone 5C. definitely has no Touch ID.

That's correct - iPhone 5C have 5 different colors on backplates.
 
Just curious why it is apples responsibility to create the crack to provide a flaw into their product? It's the FBI problem not Apple
 
10649446_10153474555422613_7512649668275006434_n.jpg
 
All is need is a FISA warrant from the secret court.
ISIS and Al Qaeda have no problems hacking our servers. My old company was hacked by Chinese through the NASA servers......
 
Back
Top