Apple Executives Believed FBI’s Dackdoor Demand Was Dangerous
Apple executive Tom Cook highlighted his critique a day federal judge release the ordered mandating Apple comply with law enforcement experts in its attempt to break the shooting criminal’s iPhone that was used by Syed Farook.
Officially after the phone was recovered by the suspect, the iPhone 5c was already in password lock and set to erase the stored data after ten failed log in attempts.
Based on Apple documents, recovering the data without password will be almost impossible to achieve just to break an iOS device running with the latest operating system, Apple already stopped saving its security keys with iOS 8 in order to implement encapsulated encryption method that can entangle pass key with device UID. And any fail attempt to break this encryption would have to take place on the device itself.
So therefore the validity of FBI’s bid to ask for Apple’s help is weak. The recent court order notes its officials to employ brute force attack after the recent custom software provided by Apple capable of disabling or bypassing iOS password counter. So if this software exists, code breaker still needs to overcome 80 millisecond cool down between password attempts.
Apple clearly estimates that it would take around five a supercomputer and half years just to crack its six-digit code considering with the combination of lowercase letters and numbers.
You may also like
- Apple Executives Believed FBI’s Dackdoor Demand Was Dangerous
- Apple Condemns FBI’s Backdoor Order
- Apple reportedly stops Drake from performing on Tidal, threatens $20 million suit (updated)
- Apple’s fiscal Q3 2015 earnings score sheet is out: 47.7 million iPhones sold, $10.7b profit made
- Samsung falls behind Apple in LTE smartphones and most searches on search engines