Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

admin
Pinned February 26, 2017

<> Embed

@  Email

Report

Uploaded by user
iOS cracking tools reportedly used by FBI released to public
<> Embed @  Email Report

iOS cracking tools reportedly used by FBI released to public

February 03, 2017 
 

Shutterstock

Last year, the FBI ordered Apple to help crack the iPhone 5c owned by Syed Farook, one of the shooters in the 2015 attacks in San Bernardino. Apple refused, and the FBI reportedly worked with Cellebrite, an Israeli firm that specializes in mobile security. According to a statement from Celelbrite last month, a hacker breached one of its legacy servers. Now the hacker has released some of that data as a warning to the FBI.

The data released includes code that seems to relate to Cellebrite’s Universal Forensic Extraction Device (UFED), and can allegedly crack older iPhones like the 5c as well as Android and Blackberry devices.

Speaking anonymously to Motherboard, the hacker explained that simply creating these tools makes their release inevitable, where they can be used by anyone with technical knowledge, including oppressive regimes around the world.

“It’s important to demonstrate that when you create these tools, they will make it out. History should make that clear,” they told Motherboard.

The ReadMe files on Pastebin.

Claiming to have taken the tools from Cellebrite’s own servers, the hacker says they were able to get into the encrypted files and post them on Pastebin, a popular code repository. Some of the code seems to have been lifted from publically accessible jailbreaking code, as well.

A spokesperson for the firm told Motherboard that the files did not include source code, only packaging information.

Apple CEO Tim Cook said at the time that creating this type of “backdoor” software would be “terrible for public safety.”

While the currently released cracking tools do not include ways to break into current device models, the warning is clear: Once made, tools like this don’t stay private for long.

Via: MacRumors
Source: Motherboard
 
 
Rob LeFebvre is an Anchorage, Alaska-based writer and editor who has contributed to various tech, gaming, and iOS sites. He has 2 teens, 4 dogs, a cat, a life-partner and too many video games. He plays guitar in a disco band, tries to write sci-fi novels, and generally avoids the snow and cold as much as possible. Feel free to find Rob on Twitter @roblef, and send him a taco once in a while; he’ll really appreciate it.

(17)