On Tue, Apr 10, 2012 at 2:36 PM, Jon Callas <j...@callas.org> wrote: > > On Apr 10, 2012, at 10:32 AM, Natanael wrote: > > Just FYI, there's been claims that these guys faked it. But on the other > hand, there ARE other tools that can extract data from iPhones so you can > bruteforce the encryption later. > > > I'm pretty certain they faked it. The question is how they faked it. They > may have faked it in a quasi-defensible way. > > It takes ~1000 seconds to brute force a four-digit PIN, because the hardware > calibrates each iteration to ~100ms (and it must be done on the device > itself, because there's a hardware key that's part of the calculation, and > if you don't want to destroy the device, you do it on the device. Thats 16 > 2/3 minutes. I believe they set the PIN to 0000 so the crack occured on the first try.
Forbes claried the article at http://www.forbes.com/sites/andygreenberg/2012/03/27/heres-how-law-enforcement-cracks-your-iphones-security-code-video/. Jeff _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography