RBSC

Collapse

Announcement

Collapse
No announcement yet.

Apple vs FBI: the technology behind the request

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Apple vs FBI: the technology behind the request

    The encryption used by the iPhone to protect its storage*is a multi-tiered system. At its core are two keys, one embedded in the hardware and the second derived from the PIN. The hardware key is used to generate a file system key that is in turn used to encrypt the file system metadata. That metadata includes an encryption key for each individual file. That per-file key is encrypted using (indirectly) an encryption key that is derived from a combination of the hardware key and the PIN key. As such, without the PIN key, it's impossible to decrypt those per-file keys and hence impossible to decrypt files stored on the iPhone.

    http://arstechnica.com/apple/2016/02...e-desired-key/


    BLACK LIVES MATTER

  • #2
    Don't know bout unnu techies out there but I had to read it twice, slowly!


    BLACK LIVES MATTER

    Comment


    • #3
      Mcafee said he can decrypt it. He said FBI should give him the phone

      http://www.businessinsider.com/john-...or-free-2016-2

      FBI want to send a strong message to Apple and others.
      • Don't let negative things break you, instead let it be your strength, your reason for growth. Life is for living and I won't spend my life feeling cheated and downtrodden.

      Comment


      • #4
        No one can convince me that the key wasn't created the same time when the security software was designed.


        BLACK LIVES MATTER

        Comment


        • #5
          Originally posted by Mosiah View Post
          The encryption used by the iPhone to protect its storage*is a multi-tiered system. At its core are two keys, one embedded in the hardware and the second derived from the PIN. The hardware key is used to generate a file system key that is in turn used to encrypt the file system metadata. That metadata includes an encryption key for each individual file. That per-file key is encrypted using (indirectly) an encryption key that is derived from a combination of the hardware key and the PIN key. As such, without the PIN key, it's impossible to decrypt those per-file keys and hence impossible to decrypt files stored on the iPhone.

          http://arstechnica.com/apple/2016/02...e-desired-key/
          Take the phone to apple, unlock it, give it to the FBI, then destroy the software that was used to unlock it.
          The same type of thinking that created a problem cannot be used to solve the problem.

          Comment


          • #6
            Bill Gates joined the debate.

            http://www.bbc.com/news/technology-35639233
            • Don't let negative things break you, instead let it be your strength, your reason for growth. Life is for living and I won't spend my life feeling cheated and downtrodden.

            Comment


            • #7
              Mere PR. Who does not think they have been cooperating from Jump?

              Comment


              • #8
                uhmm. its generally believe that iphones are hardware encrypted. Yes the PIN is used to create the key so you would need the key that encrypted that key to decrypt and apple is saying they dont do that. The issue is you cant force someone to do what is not technically possible.

                Comment


                • #9
                  how...

                  Comment

                  Working...
                  X