We live in a world where all phone device encryption is (inexpensively) broken, and yet the FBI is making a renewed push for crypto backdoors. What exactly are they thinking?https://motherboard.vice.com/en_us/article/vbxxxd/unlock-iphone-ios11-graykey-grayshift-police …
-
Show this thread
-
Replying to @matthew_d_green
Matt, is there any writeup on how GrayKey works? It’s interesting that they have an ex-Apple security engineer on staff.
2 replies 1 retweet 5 likes -
Replying to @chadloder
Nobody knows. It’s literally a black box. Obviously it uses some kind of Lightning exploit that disables throttling and security checks that the SEP is supposed to perform. But who knows.
2 replies 1 retweet 6 likes -
Replying to @matthew_d_green @chadloder
Someone should mod an iPhone (sw or physically) to log and exfiltrate the attack and leave if where some incompetent & overfunded local LE will plug it in one of these.
1 reply 0 retweets 3 likes -
They might have other vulnerabilities stockpiled which would explain why they're being so brazen about it rather than trying to protect their exploit from getting leaked and fixed.
2 replies 1 retweet 9 likes -
Replying to @CopperheadOS @RichFelker and
Once the exploit is fixed, they could sell a whole new round of these to the same law enforcement agencies since the old ones aren't going to work for updated phones. It's really in their interest to have it leaked eventually as long as they can get other exploits working.
1 reply 0 retweets 4 likes
Well unless the new round is just as friendly to non-technical cops, they might have a hard time selling them. A $15k device anyone can use is a lot more attractive than a $15k device that also requires a highly-paid forensic technician.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.