Re: [cryptography] Forensic snoops: It doesn't take a Genius to break into an iPhone

2012-04-10 Thread Jeffrey Walton
On Tue, Apr 10, 2012 at 8:50 PM, ianG wrote: > Not wishing to comment on PIN cracking, but here is some evidence that the > BYOD phenomena and iPhones are starting to get serious attention: > > http://dsd.gov.au/publications/iOS5_Hardening_Guide.pdf > > (We should look for an NSA equiv, I recall t

Re: [cryptography] Forensic snoops: It doesn't take a Genius to break into an iPhone

2012-04-10 Thread Jeffrey Walton
On Tue, Apr 10, 2012 at 2:36 PM, Jon Callas wrote: > > On Apr 10, 2012, at 10:32 AM, Natanael wrote: > > Just FYI, there's been claims that these guys faked it. But on the other > hand, there ARE other tools that can extract data from iPhones so you can > bruteforce the encryption later. > > > I'm

Re: [cryptography] Forensic snoops: It doesn't take a Genius to break into an iPhone

2012-04-10 Thread Jeffrey Walton
On Tue, Apr 10, 2012 at 1:07 PM, Randall Webmail wrote: > Cop tools easily bypass 4-digit passcodes > > By John Leyden • Get more from this author > > Posted in Enterprise Security, 10th April 2012 08:22 GMT > > Analysis Forensic tools against smartphones allow basic 4-digit phone > passcodes to

Re: [cryptography] Forensic snoops: It doesn't take a Genius to break into an iPhone

2012-04-10 Thread ianG
Not wishing to comment on PIN cracking, but here is some evidence that the BYOD phenomena and iPhones are starting to get serious attention: http://dsd.gov.au/publications/iOS5_Hardening_Guide.pdf (We should look for an NSA equiv, I recall their hardening guide for Mac OSX was far more useful.

Re: [cryptography] Forensic snoops: It doesn't take a Genius to break into an iPhone

2012-04-10 Thread Andrew R. Whalley
Hello, > If you're selling a forensic toolkit, it is not untrue that you could do it > in a few minutes on average. It's not what I'd call responsible, though I'd be inclined to agree with Jon's analysis, as have others: "The “two minutes” it takes to crack your passcode will only hold true if

Re: [cryptography] Forensic snoops: It doesn't take a Genius to break into an iPhone

2012-04-10 Thread Jon Callas
On Apr 10, 2012, at 10:32 AM, Natanael wrote: > Just FYI, there's been claims that these guys faked it. But on the other > hand, there ARE other tools that can extract data from iPhones so you can > bruteforce the encryption later. > I'm pretty certain they faked it. The question is how they

Re: [cryptography] Forensic snoops: It doesn't take a Genius to break into an iPhone

2012-04-10 Thread Natanael
Just FYI, there's been claims that these guys faked it. But on the other hand, there ARE other tools that can extract data from iPhones so you can bruteforce the encryption later. I might look for the links later. Sent from my tablet Den 10 apr 2012 19:07 skrev "Randall Webmail" : > Cop tools ea

[cryptography] Forensic snoops: It doesn't take a Genius to break into an iPhone

2012-04-10 Thread Randall Webmail
Cop tools easily bypass 4-digit passcodes By John Leyden • Get more from this author Posted in Enterprise Security, 10th April 2012 08:22 GMT Analysis Forensic tools against smartphones allow basic 4-digit phone passcodes to be bypassed in minutes. However, more complex passcodes are far m