BREAKING NEWS

02 April 2016

Apple wants the FBI to reveal how the iPhone has been cracked

While Apple had refuse to respond to requests from the FBI, which required the firm to create an OS with a "backdoor", the firm turned to the FBI to know the method used to crack the iPhone Syed Farook.

So that Apple has not responded to requests from the US federal agency, she now turns to her to better understand the methods used to crack the iPhone terrorist San Bernardino. On Monday, the FBI announced that it had managed to break into the iPhone Syed Farook, one of the authors of the massacre of San Bernardino, without Apple's help. The giant can only worry about a likely vulnerability that would endanger millions of its devices worldwide.


"One way or another, Apple has to discover the details of this operation," said Justin Olsson, product advisor at AVG Technologies. "It is necessary that the government entrusts Apple, privately, more information about the vulnerability exploited - so they further enhance the security of their devices." Which is not yet played. Indeed, it is not uncommon for governments to develop or buy regularly intrusion techniques closed systems, for the purpose of terrorism against

Is your iPhone in danger?

The ethical dilemma that has emerged in the case of the iPhone 5c San Bernardino is: must the technology companies beings made aware of defects in their products and software layers, or should we keep this secret knowledge , to have on hand an intrusion tool in case of crime?
It is not clear whether the technique used by the FBI would work on other versions of the iPhone, however, an official of the police, who requested anonymity, discussed the application of the method was also his limits. While the Israeli firm Cellebrite has been identified by several sources as the third person involved in the release of the iPhone Syed Farook, neither the company nor the FBI have confirmed these rumors . According to a source, it is likely that the FBI was able to benefit from the ability to capture more than 10 wrong access codes without blocking the smartphone, and the integrity of its data. However, it is unclear whether the federal agency has actually recovered data - and whether they will be helpful to the investigation.

Share this:

Post a Comment

 
Back To Top
Distributed By Blogger Templates | Designed By OddThemes