On Tue, Apr 10, 2012 at 2:36 PM, Jon Callas <j...@callas.org> wrote:
>
> On Apr 10, 2012, at 10:32 AM, Natanael wrote:
>
> Just FYI, there's been claims that these guys faked it. But on the other
> hand, there ARE other tools that can extract data from iPhones so you can
> bruteforce the encryption later.
>
>
> I'm pretty certain they faked it. The question is how they faked it. They
> may have faked it in a quasi-defensible way.
>
> It takes ~1000 seconds to brute force a four-digit PIN, because the hardware
> calibrates each iteration to ~100ms (and it must be done on the device
> itself, because there's a hardware key that's part of the calculation, and
> if you don't want to destroy the device, you do it on the device. Thats 16
> 2/3 minutes.
I believe they set the PIN to 0000 so the crack occured on the first try.

Forbes claried the article at
http://www.forbes.com/sites/andygreenberg/2012/03/27/heres-how-law-enforcement-cracks-your-iphones-security-code-video/.

Jeff
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to