Our website is made possible by displaying online advertisements to our visitors.

Please consider supporting us by disabling your ad blocker.
Sign in to follow this  
Followers 0
titanic1

Edward Snowden Interview on Apple vs. FBI, Privacy, the NSA, and More

2 posts in this topic

Posted (edited)

https://www.youtube.com/watch?v=o8pkUTav0mk

We said yesterday that the war of words on the Apple/FBI dispute were hotting up, and Edward Snowden has now taken things a step further, suggesting that the FBI’s claims that they need Apple to access the iPhone are … not true. His comments were reported by The Intercept, which posted video of the discussion at a civil liberties conference.

https://i.ytimg.com/vi/o8pkUTav0mk/maxresdefault.jpg

“The FBI says Apple has the ‘exclusive technical means’” to unlock the phone, Snowden said during a discussion at Common Cause’s Blueprint for Democracy conference.

“Respectfully, that’s bullsh*t,” he said, over a video link from Moscow.

Snowden had earlier described how the FBI could physically extract the passcode from the iPhone chip, and has now linked to an explanation of how the agency could bypass the auto-erase feature …

The method, posted on the ACLU website, relies on the fact that the ‘passcode attempt’ counter is store in NAND flash memory, in what is known as Effaceable Storage.

All the FBI needs to do to avoid any irreversible auto erase is simple to copy that flash memory (which includes the Effaceable Storage) before it tries 10 passcode attempts. It can then re-try indefinitely, because it can restore the NAND flash memory from its backup copy […]

https://i.ytimg.com/vi/hNI0n-s_nkA/hqdefault.jpg

The FBI can simply remove this chip from the circuit board (“desolder” it), connect it to a device capable of reading and writing NAND flash, and copy all of its data. It can then replace the chip, and start testing passcodes. If it turns out that the auto-erase feature is on, and the Effaceable Storage gets erased, they can remove the chip, copy the original information back in, and replace it. If they plan to do this many times, they can attach a “test socket” to the circuit board that makes it easy and fast to do this kind of chip swapping.

Read more... http://9to5mac.com/2016/03/09/edward-snowden-fbi-apple/

According to The Intercept, Snowden made an appearance at the Common Cause’s Blueprint for Democracy conference over a video link from Moscow.

“The FBI says Apple has the ‘exclusive technical means,’” he said. “Respectfully, that’s bulls**t.” He then proceeded to explain how the FBI could force its way into the iPhone – which is how the FBI wants to get in – without Apple’s assistance.

The FBI is worried that after entering the wrong PIN for 10 times in a row, the iPhone could automatically erase data stored on it. So that’s one of the things it’s asking Apple to remove. But Snowden revealed that the FBI could physically remove the memory from the phone’s mainboard, copy it, and then try password combinations until it finds the right one.

The method is described in a post on the American Civil Liberties Union (ACLU) site, which claims that FBI’s stance on this particular matter is a lie. The Bureau is worried the iPhone could destroy itself, but this method would let its hackers save the contents without Apple’s help.

http://www.ruofficial.com/attachment.php?attachmentid=1261

“All the FBI needs to do to avoid any irreversible auto erase is simple to copy that flash memory (which includes the Effaceable Storage) before it tries 10 passcode attempts. It can then re-try indefinitely because it can restore the NAND flash memory from its backup copy,” ACLU wrote.

“The FBI can simply remove this chip from the circuit board (“desolder” it), connect it to a device capable of reading and writing NAND flash, and copy all of its data. It can then replace the chip, and start testing passcodes. If it turns out that the auto-erase feature is on, and the Effaceable Storage gets erased, they can remove the chip, copy the original information back in, and replace it. If they plan to do this many times, they can attach a “test socket” to the circuit board that makes it easy and fast to do this kind of chip swapping.”

Of course, the FBI can still argue that this method is too laborious, and guessing the password could take a lot of time, which is why it needs Apple to help out with a special version of iOS that would circumvent security measures. On the other hand, others have also speculated that the FBI has what it takes to crack the iPhone 5c belonging to one of the San Bernardino’s shooters without Apple’s help.

Read more... http://bgr.com/2016/03/09/apple-fbi-iphone-case-edward-snowden/

Edited by Cinnamon
removed images and replaced with image links

Share this post


Link to post
Share on other sites

If they can do extractions of the NAND chip that can save the data.... why do they need to worry about the passcode on the iPhone????

Share this post


Link to post
Share on other sites
Guest
You are commenting as a guest. If you have an account, please sign in.
Reply to this topic...

×   You have pasted content with formatting.   Restore formatting

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

Sign in to follow this  
Followers 0

Our website is made possible by displaying online advertisements to our visitors.

Please consider supporting us by disabling your ad blocker.