My understanding of the logistics is that the user key and the unique signature burned into each device are hashed together as the key for encrypting the data, so there is no way Apple could decrypt it for the FBI. What Apple did do was implement the self-destruct where you get 10 tries and the data goes poof. There is also a small but real slowdown in responsiveness after each failed attempt. So the FBI would like a version of iOS that lacks the self destruct and the slowdown, which would allow them to brute-force entry. The FBI can't make FBios and install it because Apple also digitally signs their installers. This is where the rubber meets the road. Apple or the FBI could create a non-imploding version of iOS but only Apple holds the digital signature which would allow a phone to accept the build. This is what Apple has have been asked to do, to put their signature to something which defeats the self-destruct and no longer thwarts a brute force attack on the unlock code. If they sign the FBios install then they will also be compelled to sign LibyaOS, SudanOS, BurmaOS etc. or sign for other less clear-cut cases. In short, they will never get the genie back in the bottle.

As you say, a longer user key would go to great lengths to thwart a brute force attack. If Apple takes the blue pill and compromises its own security system it simply means the bad actors will just move on to apps that encrypt things on their own from companies or loose collections of folks whom the FBI has no leverage with.

CB

On 2/23/16 6:41 PM, Sabahattin Gucukoglu wrote:
My understanding is that the FBI is asking Apple for the technical capability 
to brute-force the key.  That’s all.  The problem with Apple’s current design 
is that it is vulnerable to simple firmware substitution.  The assumptions that 
it makes about the user’s key are all predicated on the notion that Apple would 
never replace the firmware.  As we now see, this was a bad choice.  With FBIos 
in place, that four-digit or even six-digit key will be cracked in no time.  
Regardless of whether Apple develops it, we now have positive confirmation that 
it’s possible.  Quite simply, the iOS remote wipe, manual entry requirements, 
and delayed entry are no obstacles to key recovery.

Or in other words, Apple can (and should!) fix this problem, simply and 
effectively, by providing a strength meter for the passcode selection screen, 
with the strongest indicator reserved for passphrases that will not be 
trivially recovered using firmware substitution, and then force every user of 
iOS to select a new passphrase on upgrade.  I have already selected a 
nine-character passphrase with uppercase, lowercase, numbers and punctuation.  
With Touch ID, I really don’t feel a thing.


--
¯\_(ツ)_/¯

--
The following information is important for all members of the Mac Visionaries 
list.

If you have any questions or concerns about the running of this list, or if you 
feel that a member's post is inappropriate, please contact the owners or 
moderators directly rather than posting on the list itself.

Your Mac Visionaries list moderator is Mark Taylor and your owner is Cara Quinn 
- you can reach Cara at caraqu...@caraquinn.com

The archives for this list can be searched at:
http://www.mail-archive.com/macvisionaries@googlegroups.com/
--- You received this message because you are subscribed to the Google Groups "MacVisionaries" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to macvisionaries+unsubscr...@googlegroups.com.
To post to this group, send email to macvisionaries@googlegroups.com.
Visit this group at https://groups.google.com/group/macvisionaries.
For more options, visit https://groups.google.com/d/optout.

Reply via email to