Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Cellphones Crime Handhelds IOS Iphone Privacy Security Apple

DOJ Says iPhone Is So Secure They Can't Crack It 454

zacharye writes "In the five years since Apple launched the iPhone, the popular device has gone from a malicious hacker's dream to law enforcement's worst nightmare. As recounted by the Massachusetts Institute of Technology's Technology Review blog, a Justice Department official recently took the stage at the DFRWS computer forensics conference in Washington, D.C. and told attendees that the beefed up security in iOS is now so good that it has become a nightmare for law enforcement."
This discussion has been archived. No new comments can be posted.

DOJ Says iPhone Is So Secure They Can't Crack It

Comments Filter:
  • I don't believe it (Score:1, Interesting)

    by 1s44c ( 552956 ) on Monday August 13, 2012 @01:20PM (#40974959)

    As far as I know the iphone doesn't use full disk encryption. It's not that difficult to get all the data off it.

    What 'law enforcement' means is that it's not convenient to steal people's data.

  • by turbidostato ( 878842 ) on Monday August 13, 2012 @01:29PM (#40975099)

    The iPhone sports a master encryption key and DOJ has access to it.

  • by mshenrick ( 1874438 ) on Monday August 13, 2012 @01:51PM (#40975435) Homepage
    Unlike Android (when enabled), it doesn't prompt for the key before booting the OS, so it's only partly encrypted. Yes the OS is mounted read only on iOS (as on Android by default) jailbreaking changes this, as does rooting, but you can't if it's fully encrypted
  • by spire3661 ( 1038968 ) on Monday August 13, 2012 @01:52PM (#40975445) Journal
    Its a problem, they just choose to ignore the human side of the law. The position the British have taken on this is untenable.
  • encryption laws (Score:5, Interesting)

    by Sebastopol ( 189276 ) on Monday August 13, 2012 @02:06PM (#40975647) Homepage

    Can somebody explain how if the iPhone is so uncrackable/breakable that Apple can still export it? I seem to recall some kind of PGP problem where exporting something that was too secure was a violation of US laws. Or maybe I'm mixing reality with a bad Nicholas Cage movie, which is entirely possible.

  • by Brannon ( 221550 ) on Monday August 13, 2012 @02:11PM (#40975701)

    would that still be a misdirection?

    Oh, I see, anything which is said in favor of iPhone security is "reverse psychology", anything critical of iPhone security is "speaking truth to power".

    You guys crack me up.

  • Re:mod TFS (Score:5, Interesting)

    by Just Some Guy ( 3352 ) <kirk+slashdot@strauser.com> on Monday August 13, 2012 @02:45PM (#40976139) Homepage Journal

    This is purely anecdotal, but... I was recently on a flight next to a highway patrolman flying back from a conference for computer detectives (my words, not his; I don't remember what the actual job title was). He showed me the modified Ubuntu distro DVD they were passing out - "Look, it has a password cracker!" "Is that John the Ripper?" "You've heard of that?!?" - and we had a pretty nice chat.

    During the conversation, I mentioned that iPhones are encrypted now. I asked, "OK, hypothetically, suppose I'm a mafia drug dealer and you get my encrypted cell phone. How screwed am I?" He said that they'd get a subpoena for my house, show up with a search warrant, and read the backup off my Mac's hard drive, "and then we run this app [opens it to show it to me] and have full access to all your data!" I told him that was pretty impressive, "but... what if I turn on FileVault and encrypt my whole hard drive?" He looked like I'd kicked his puppy and said that most criminals aren't smart enough to do that, but in that case, yeah, there was nothing he could do.

    Feel free to take that with a grain of salt, but I had a detective tell me - in an unguarded two-geeks-talking moment with no apparent motive or visible sign of deceit - that the only way they could recover an encrypted iPhone's contents was through examining the unencrypted backup from an unencrypted hard drive. Now this was a state highway patrol guy and not an NSA analyst, and maybe the higher-up guys have access to emergency use stuff they're not talking about, but my takeaway was that the state-level police really don't have any way to defeat the encryption.

  • Re:mod TFS (Score:5, Interesting)

    by Shakrai ( 717556 ) * on Monday August 13, 2012 @03:04PM (#40976349) Journal

    Now this was a state highway patrol guy and not an NSA analyst, and maybe the higher-up guys have access to emergency use stuff they're not talking about, but my takeaway was that the state-level police really don't have any way to defeat the encryption.

    Without talking about bad implementation (e.g., weak passwords) or side channel attacks (keystroke loggers and the like) it seems exceedingly unlikely that any law enforcement agency would have the ability to defeat modern encryption algorithms. Even if the NSA has such an ability (the math geeks can comment on the likelihood of this) it would be far too valuable to waste on something as mundane as a criminal prosecution. National Security concerns trump the incarceration of child molesters, drug dealers, murderers, and other common criminals.

    Far more interesting than the technical aspect will be the evolution of 5th amendment case law as it relates to encryption. There is no definitive legal precedent in the United States as to whether or not you can be compelled to disclose an encryption password. There have been a few cases that have danced around the edge of this question, but none have directly addressed it, nor have they made it to SCOTUS.

  • Re:mod TFS (Score:4, Interesting)

    by mark-t ( 151149 ) <markt AT nerdflat DOT com> on Monday August 13, 2012 @03:13PM (#40976455) Journal

    "....most criminals aren't smart enough to do that"

    I can't seem to help but read that as ".... criminals who are smart enough to do that will probably get away."

  • by mark-t ( 151149 ) <markt AT nerdflat DOT com> on Monday August 13, 2012 @03:17PM (#40976493) Journal
    So.... if you really *DID* forget the password, you could be looking at spending the rest of your life in prison, even if you never did anything wrong... simply because somebody thought you were guilty, and you had a faulty memory?
  • Re:TWO WORDS (Score:5, Interesting)

    by 93 Escort Wagon ( 326346 ) on Monday August 13, 2012 @04:07PM (#40976953)

    OF COURSE they have a key. Any cloud-based data you can access through a web browser requires as much - whether it's with Apple, Amazon, Dropbox, Google...

    And per one of your links, right after they say "of course Apple has a decryption key":

    Still, vice president of products for cloud security firm Echoworx, Robby Gulri, noted that Apple is following best practices used throughout the industry. "Apple has taken the right steps to protect users' data and privacy as far as a widely public service like iCloud goes," he told Ars. "For example, data is transmitted using SSL, data is encrypted on disk using 128-bit keys, and Apple has stopped letting developers use individual UDIDs."

  • by PeanutButterBreath ( 1224570 ) on Monday August 13, 2012 @05:38PM (#40977877)

    Why? This is part of history, and people should know what attitudes were publicly held and presented to see how much we've changed over the years.

    We haven't changed over the years. Those attitudes are still common, but they are no longer publicized. So, by self-censoring itself in public, Disney is accurately reflecting racial attitudes in American society.

    So, is Disney to teach us about history? Or the present?

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...