The Naked Scientists
  • Login
  • Register
  • Podcasts
      • The Naked Scientists
      • eLife
      • Naked Genetics
      • Naked Astronomy
      • In short
      • Naked Neuroscience
      • Ask! The Naked Scientists
      • Question of the Week
      • Archive
      • Video
      • SUBSCRIBE to our Podcasts
  • Articles
      • Science News
      • Features
      • Interviews
      • Answers to Science Questions
  • Get Naked
      • Donate
      • Do an Experiment
      • Science Forum
      • Ask a Question
  • About
      • Meet the team
      • Our Sponsors
      • Site Map
      • Contact us

User menu

  • Login
  • Register
  • Home
  • Help
  • Search
  • Tags
  • Recent Topics
  • Login
  • Register
  1. Naked Science Forum
  2. Non Life Sciences
  3. Geek Speak
  4. What is the FBI asking Apple to do?
« previous next »
  • Print
Pages: [1]   Go Down

What is the FBI asking Apple to do?

  • 16 Replies
  • 10109 Views
  • 0 Tags

0 Members and 1 Guest are viewing this topic.

Offline cheryl j (OP)

  • Naked Science Forum King!
  • ******
  • 1478
  • Activity:
    0%
  • Thanked: 6 times
What is the FBI asking Apple to do?
« on: 18/02/2016 06:43:50 »
I've read several articles about the controversy surrounding the FBI, Apple, and the locked Iphone of the San Bernadino shooters. It's not clear in these articles exactly what the FBI is asking Apple to do, or even if the tool or method currently exists that would actually allow them to open or decrypt the phone. Some articles suggest they can, but if they make an exception, countless other requests will inevitably follow. Other articles suggest that "it just doesn't work like that." Can someone clarify all this?
Logged
 



Offline RD

  • Naked Science Forum GOD!
  • *******
  • 9094
  • Activity:
    0%
  • Thanked: 163 times
Re: What is the FBI asking Apple to do?
« Reply #1 on: 18/02/2016 08:13:57 »
The Apple phone has a sort of self-destruct: it will scramble the data stored after 10 password attempts have failed. If someone (Apple?) could make a back-up copies of the [encrypted] contents of the phone, then the FBI could try to crack* the copies , ( if the copy on a virtual phone self-destructed that's not a problem : just use another copy ).

If the phone-owner used a long gibberish pass-phrase then it will be uncrackable , even with the computing-power available to the FBI. 

* https://en.wikipedia.org/wiki/Category:Password_cracking_software
 
« Last Edit: 18/02/2016 13:49:29 by RD »
Logged
 

Offline evan_au

  • Global Moderator
  • Naked Science Forum GOD!
  • ********
  • 11033
  • Activity:
    8%
  • Thanked: 1486 times
Re: What is the FBI asking Apple to do?
« Reply #2 on: 18/02/2016 11:23:08 »
Quote from: cheryl j
It's not clear in these articles exactly what the FBI is asking Apple to do
Every nation has some process for allowing security agencies to tap into private data. And there are legal compulsions for companies to cooperate if due process has been followed by the courts.
 
It appears that the blanket terminology of the "All Writs Act" of 1789 has previously been used to force smartphone manufacturers to assist security agencies to unlock phones, and read the content of the phone.

In this case, the court wants Apple to create a special version of the phone's software that will enable an unlimited number of attempts at entering the password, and to allow the passwords to be entered electronically, rather than using the touchscreen.

Normally the phone will erase the memory after 10 failed attempts. Electronic entry of passwords would allow unlimited, rapid guesses.

Quote
It's not clear .. if the tool or method currently exists that would actually allow them to open or decrypt the phone
.
Apple claims that they have fully cooperated with security agencies and legal process (ie to tell them how the encryption works, and how to crack it).

Reading between the lines...
  • Security agencies can read the contents of general-purpose memory chips, but with the data encrypted, it is just gibberish.
  • Knowing the encryption algorithm is just part of the problem - you also have to know (or guess) the encryption key. And it is possible to make that key long enough to take a thousand years to crack with todays computers.
  • It is generally easier to guess a password than to guess a long encryption key. After all, the length of the password is limited by the owner's patience and dexterity.
  • If part of the encryption key is embedded inside a special-purpose chip within the phone, is not readable from outside the chip, and not recorded by Apple at time of manufacture, then guessing the password will not decrypt the files. If such a security key were the first thing erased when you reach 10 failed passwords, the phone data will be unusable (at least for 10 or 20 years until we have much more powerful computers).
  • This leaves the security agencies with the tricky task of carefully grinding the lid and top-level circuitry off the encryption chip, and using an atomic force microscope or similar to read the contents of the memory cells containing the encryption key.

What the security agencies would really like is some software that they can download on any phone, and read the memory contents - even when the phone is in your pocket. Tearing the phone apart might make the owner a bit suspicious. (...and what lawyer would look at the disassembled and mangled phone, and not be suspicious that someone had been tampering with the evidence?).

Apple says that they wish to protect the privacy of their customers, so they don't want to create this "Trojan Horse" software. Once it has been created, that horse has (figuratively) bolted. No doubt they would be forced to produce similarly "hacked" versions of all future software.

And its not just for the FBI; every security agency in every country will want that "Trojan horse" version of the software so they can hack into Apple phones owned by citizens of other countries. It is a small step from there for governments to ban their employees from using Apple phones - and perhaps completely ban Apple products from import and sale in their country.

Apple argues that there are laws already covering this area of national security, and changes to the existing laws should be debated and enacted by the government, and not invented on the spot by a judge.
Logged
 

Offline evan_au

  • Global Moderator
  • Naked Science Forum GOD!
  • ********
  • 11033
  • Activity:
    8%
  • Thanked: 1486 times
Re: What is the FBI asking Apple to do?
« Reply #3 on: 19/02/2016 08:22:49 »
I heard another aspect today...
Apparently Apple uses public-key cryptography to validate software before the phone will run the software.

Apple's public key is hard-coded in the phone. Apple signs tested and approved software with its private key, and the phone can validate that the software is approved software using Apple's public key.

If someone modifies the software, the signature won't match (with a very high confidence), and the software won't run.
  • If a criminal tries to modify your phone software, the hack will be detected, and the software won't run.
  • If a spy tries to modify your phone software, the hack will be detected, and the software won't run.
  • If a security agency tries to modify your phone software, the hack will be detected, and the software won't run. 

Apple needs to keep its private key absolutely secret, otherwise criminals will be able to modify software, load it on your phone, and steal your data. If Apple gives the private key to every security agency that demands it, they will all be able to run any software they please on any phone in the world they want to target.

I can see why Apple does not want to give away the keys to unlock their phones.
Logged
 

Online alancalverd

  • Global Moderator
  • Naked Science Forum GOD!
  • ********
  • 21152
  • Activity:
    72%
  • Thanked: 60 times
  • Life is too short for instant coffee
Re: What is the FBI asking Apple to do?
« Reply #4 on: 19/02/2016 11:54:17 »
And another aspect: if Apple produce a universal key, it could inevitably will leak out of the FBI and into the hands of every fraudster who wants access to your bank account. Unlilkely? Well, the reward is effectively infinite, and people take bigger risks for less.

And another: if FBI, why not GCHQ, KGB,  or the honourable government of Nigeria? If the FBI caught an ISIS member, should they hand the key to the Assad government?  Shared intelligence is not always in the interests of the population.
Logged
Helping stem the tide of ignorance
 



Offline the5thforce

  • Sr. Member
  • ****
  • 163
  • Activity:
    0%
  • Thanked: 1 times
Re: What is the FBI asking Apple to do?
« Reply #5 on: 19/02/2016 19:52:21 »
considering without encryption someone would be able to track your exact location and kill you, or track your family members and harm them, or threaten ransom, blackmail you, theres endless potential for mayhem and we will only become more reliant on technology going forward, what happens when we all start relying on life extending technology to sustain us? or even just accessing a private message you sent about a lethal allergy you have(be pretty easy to poison you). encryption is the only security

the government wants to solve one problem by creating a thousand new problems, as usual
« Last Edit: 20/02/2016 00:48:54 by the5thforce »
Logged
 

Offline cheryl j (OP)

  • Naked Science Forum King!
  • ******
  • 1478
  • Activity:
    0%
  • Thanked: 6 times
Re: What is the FBI asking Apple to do?
« Reply #6 on: 22/02/2016 02:00:28 »
Thanks, folks. Best explanation I've read anywhere.
Logged
 

Offline cheryl j (OP)

  • Naked Science Forum King!
  • ******
  • 1478
  • Activity:
    0%
  • Thanked: 6 times
Re: What is the FBI asking Apple to do?
« Reply #7 on: 22/02/2016 02:17:53 »
I just saw the John Mcaffee says he can decrypt the phone using "social engineering" and it will takes 3 weeks and there will be no need for Apple to create a back door. What does he mean?
Logged
 

Offline RD

  • Naked Science Forum GOD!
  • *******
  • 9094
  • Activity:
    0%
  • Thanked: 163 times
Re: What is the FBI asking Apple to do?
« Reply #8 on: 22/02/2016 05:52:21 »
Quote from: cheryl j on 22/02/2016 02:17:53
... Apple to create a back door ...

The "back door" would have to be in existence [on the phone] before the data was encrypted. If one doesn't already exist , creating a "back door" now would only make future phones vulnerable.


Quote from: cheryl j on 22/02/2016 02:17:53
... What does [John Mcaffee] mean?

Depending on how much "bath salts" he's used , even he may not know what he's saying  [:D] ...

 [ Invalid Attachment ]

* v=bKgf5PaBzyg [NSFW].jpg (95.58 kB, 655x539 - viewed 2418 times.)
« Last Edit: 22/02/2016 05:54:22 by RD »
Logged
 



Offline chris

  • Naked Science Forum King!
  • ******
  • 8061
  • Activity:
    1.5%
  • Thanked: 305 times
  • The Naked Scientist
    • The Naked Scientists
Re: What is the FBI asking Apple to do?
« Reply #9 on: 22/02/2016 09:28:05 »
Quote from: evan_au on 18/02/2016 11:23:08
This leaves the security agencies with the tricky task of carefully grinding the lid and top-level circuitry off the encryption chip, and using an atomic force microscope or similar to read the contents of the memory cells containing the encryption key.

Wow - you can do this?
Logged
I never forget a face, but in your case I'll make an exception - Groucho Marx - https://www.thenakedscientists.com/
 

Offline evan_au

  • Global Moderator
  • Naked Science Forum GOD!
  • ********
  • 11033
  • Activity:
    8%
  • Thanked: 1486 times
Re: What is the FBI asking Apple to do?
« Reply #10 on: 22/02/2016 20:42:50 »
Quote from: evan_au
carefully grinding the lid and top-level circuitry off the encryption chip
This has been a standard practice for doing fault analysis of commercial chip failures in the factory and field. I have seen several reports produced in this way.

It is very delicate work, and expensive, but sometimes there is no other way to analyze faults and improve the design.

Many years ago, there were fears that companies would offer a more extensive service of grinding off progressive layers of circuitry, taking images of each layer, and turning them into "masks" that could be used to clone commercial chips. I imagine that this has become more difficult as the size of chip features dropped below the wavelength of light into the realm of the electron microscope.

But its a very real threat - in 2001 when a US spy plane was forced to land in China, the first thing they did was to smash all their top-secret chips, and dump them overboard.

There has even been recent discussion of building pyrotechnics into commercial security chips - at the first sign of tampering, a pulse of electricity would trigger an explosion inside the chip, melting the circuitry into a puddle. 

See "Intelligence loss" at: https://www.fas.org/sgp/crs/row/RL30946.pdf
Logged
 

Offline RD

  • Naked Science Forum GOD!
  • *******
  • 9094
  • Activity:
    0%
  • Thanked: 163 times
Re: What is the FBI asking Apple to do?
« Reply #11 on: 22/02/2016 23:43:47 »
If the string of characters used as a password is random, with no resemblance to words in any dictionary, (unlike what I've done here) , then 14 characters is plenty to make cracking by brute force unfeasibly time-consuming if you include upper & lower case , number , and symbol ...

 [ Invalid Attachment ]
https://www.grc.com/haystack.htm

* 14 random characters is safe.gif (71.03 kB, 806x575 - viewed 2091 times.)
« Last Edit: 23/02/2016 00:03:35 by RD »
Logged
 

Offline chris

  • Naked Science Forum King!
  • ******
  • 8061
  • Activity:
    1.5%
  • Thanked: 305 times
  • The Naked Scientist
    • The Naked Scientists
Re: What is the FBI asking Apple to do?
« Reply #12 on: 24/02/2016 21:43:48 »
This image is the analysis of one of my server passwords. I should be okay...

* PASSWORD-CRACKABILITY.jpg (70.02 kB, 653x423 - viewed 589 times.)
Logged
I never forget a face, but in your case I'll make an exception - Groucho Marx - https://www.thenakedscientists.com/
 



Offline syhprum

  • Naked Science Forum King!
  • ******
  • 5198
  • Activity:
    0%
  • Thanked: 74 times
Re: What is the FBI asking Apple to do?
« Reply #13 on: 30/03/2016 00:26:03 »
I would be interested to know whether the FBI have actually generated a password and accessed data in the phone or simply found a way to bypass the self destruct system.
For a brute force password generation to work you need a way to input trial passwords rapidly you cannot do it by pressing buttons !.
Logged
 

Offline RD

  • Naked Science Forum GOD!
  • *******
  • 9094
  • Activity:
    0%
  • Thanked: 163 times
Re: What is the FBI asking Apple to do?
« Reply #14 on: 30/03/2016 12:11:36 »
Quote from: theguardian.com
“The government has now successfully accessed the data stored on Farook’s iPhone and therefore no longer requires the assistance from Apple Inc,” the government said.
http://www.theguardian.com/technology/2016/mar/28/apple-fbi-case-dropped-san-bernardino-iphone

"accessed the data" doesn't necessary mean being able to decrypt it. 
Logged
 

Offline evan_au

  • Global Moderator
  • Naked Science Forum GOD!
  • ********
  • 11033
  • Activity:
    8%
  • Thanked: 1486 times
Re: What is the FBI asking Apple to do?
« Reply #15 on: 10/04/2016 11:57:14 »
Here are some educated guesses about how the FBI may have achieved it...
http://spectrum.ieee.org/tech-talk/telecom/security/5-ways-experts-think-the-fbi-might-have-hacked-the-san-bernardino-iphone
Logged
 

Offline evan_au

  • Global Moderator
  • Naked Science Forum GOD!
  • ********
  • 11033
  • Activity:
    8%
  • Thanked: 1486 times
Re: What is the FBI asking Apple to do?
« Reply #16 on: 15/07/2016 01:22:04 »
An interesting article, suggesting that the FBI should encourage better encryption, not try to poke holes in it:
http://spectrum.ieee.org/tech-talk/telecom/security/expert-to-fbi-please-join-the-21st-century-we-could-use-the-help
Logged
 



  • Print
Pages: [1]   Go Up
« previous next »
Tags:
 
There was an error while thanking
Thanking...
  • SMF 2.0.15 | SMF © 2017, Simple Machines
    Privacy Policy
    SMFAds for Free Forums
  • Naked Science Forum ©

Page created in 0.709 seconds with 74 queries.

  • Podcasts
  • Articles
  • Get Naked
  • About
  • Contact us
  • Advertise
  • Privacy Policy
  • Subscribe to newsletter
  • We love feedback

Follow us

cambridge_logo_footer.png

©The Naked Scientists® 2000–2017 | The Naked Scientists® and Naked Science® are registered trademarks created by Dr Chris Smith. Information presented on this website is the opinion of the individual contributors and does not reflect the general views of the administrators, editors, moderators, sponsors, Cambridge University or the public at large.