Apple is pushing back against the federal government’s demands to unlock another iPhone, this time related to a drug case in Brooklyn.
In a new filing posted on Friday, the iPhone-maker has asked a New York judge to dismiss the federal government’s appeal against Apple, claiming the DoJ has not proved that it has exhausted all resources to unlock the iPhone in question.
We’ve heard plenty of bluster about how the FBI won’t tell Apple how it cracked the iPhone 5c at the heart of the San Bernardino shooting case, but there’s another possibility, too: that the Feds can’t tell Apple how it did it.
Why? Because according to a new report, citing Obama administration sources, it may not actually have legal ownership of the method in question.
The FBI signed a $15,000 contract with Israeli-tech firm Cellebrite to crack the iPhone 5c at the heart of the San Bernardino shooting investigation. However, according to a new report, Cellebrite may not have been the ones who successfully hacked the smartphone, after all.
Instead, the Feds reportedly broke into the iPhone 5c with the aid of a group of professional hackers who discovered and brought to the bureau a previously unknown iOS flaw — letting them get around the iPhone’s four-digit pincode feature, without accidentally erasing the iPhone’s data in the process.
Israeli tech firm Cellebrite, a.k.a. the mobile forensics firm which helped the FBI hack the iPhone 5c at the center of the San Bernardino shooting case, is reportedly “optimistic” about hacking the more secure iPhone 6.
The story in this instance involves an Italian father, Leonardo Fabbretti, wanting to access the iPhone photos, notes and messages belonging to his adopted son Dama, who passed away from bone cancer last September at the age of 13.
However, it seems that Apple’s back in the driving seat after a new report reveals that the Justice Department may be compelled to reveal its hacking methods if it wants to continue with a case asking a New York court to force Apple to unlock a different iPhone handset.
Although most of the attention on Apple’s privacy standoff with the government has so far focused on the United States, the U.S. isn’t the only place where Apple’s fighting with the authorities over iPhone encryption.
In France, politician Yann Galut, a member of the country’s Socialist Party, has submitted an amendment to a bill designed to strengthen the French government’s fight against terror — by arguing that Apple should pay €1 million per smartphone if it does not “promptly” agree to unlock devices when asked to by law enforcement.
A federal judge has ordered Apple to comply with the FBI’s demands to unlock the San Bernardino terrorist’s iPhone 5c. Apple CEO Tim Cook has boldly and politely refused. However, his reason has nothing to do with whether Apple has the ability to hack the iPhone.
It simply doesn’t want to.
Apple has spent the past few years making its devices more secure by adding Touch ID and a secure element. The iPhone 5c doesn’t have Touch ID, though, so the FBI wants to brute-force unlock it by guessing the terrorist’s PIN. The problem is, iOS will automatically wipe the device after too many unsuccessful attempts — and iOS also delays how often you can guess a passcode. So the FBI created a plan for how Apple can help the bureau get around it.
Apple has touted the Mac’s resistance to viruses for decades as a selling point over Windows PCs, but a team of researchers have created a new firmware worm for Mac that might just make you want to go back to doing work on good old pencil and paper.
Two white-hat hackers discovered that several vulnerabilities affecting PC makers can also bypass Apple’s renowned security to wreak havoc on Mac firmware. The two created a proof-of-concept of the worm called Thunderstrike 2 that allows firmware attacks to be spread automatically from Mac to Mac. Devices don’t even need to be networked for the worm to spread, and once it’s infected your machine the only way to remove it is to open up your Mac and manually reflash the chip.