TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Apple Is Said to Be Working on an iPhone Even It Can’t Hack

620 pointsby rquantzabout 9 years ago

43 comments

tptacekabout 9 years ago
They&#x27;re presumably already 99% of the way there. If the Secure Enclave can be updated on a locked phone, all they need to do is stop allowing that, right?<p>To me, the more profound consideration is this: if you use a strong alphanumeric password to unlock your phone, there is nothing Apple has been able to do for many years to unlock your phone. The AES-XTS key that protects data on the device is derived from your passcode, via PBKDF2. These devices were <i>already</i> fenced off from the DOJ, as long as their operators were savvy about opsec.
评论 #11172424 未加载
评论 #11171832 未加载
评论 #11172572 未加载
评论 #11171281 未加载
评论 #11171546 未加载
评论 #11171207 未加载
评论 #11172097 未加载
评论 #11172742 未加载
评论 #11172985 未加载
评论 #11171856 未加载
评论 #11172366 未加载
评论 #11172236 未加载
cromwellianabout 9 years ago
Any device that relies on hiding secrets inside the silicon itself is subject to hacking. Several secure-enclave like chips have been hacked in the past by using electron microscopes and direct probes on the silicon. If BlackHat conference independent security researchers have the resources to pull this off, Apple and the NSA certainly can. Exfiltrating the Enclave UID could be done by various mechanisms at the chip level, especially if you have access to the actual HW design and can fab devices to help.<p>I mean, we&#x27;re talking about threat models where chip-level doping has been shown as an attack. This just seems to be a variation on the same claims of copy protection tamper resistant dongles we&#x27;ve had forever. That someone builds a secure system that is premised on a secret being held in a tiny tamper-resistant piece, only the tamper resistance is eventually cracked.<p>It might even be the case that you don&#x27;t even need to exfiltrate the UID from the Enclave, what the FBI needs to do is test a large number of PIN codes without triggering the backoff timer or wipe. But the wipe mechanism and backoff timer runs in the application processor, not on the enclave, and so it is succeptable to cracking attacks the same way much copy protection techniques are.<p>You may not need to crack the OS, or even upload a new firmware. You just need to disable the mechanism that wipes the device and delays how many wrong tries you get. So for example, if you can manage to corrupt, or patch the part of the system that does that, then you can try thousands of PINs without worrying about triggering the timer or wipe, and without needing to upload a whole new firmware.<p>I used to crack disk protection on the Commodore 64 and no matter how sophisticated the mechanism all I really needed to do was figure out one memory location to insert a NOP into, or change a BNE&#x2F;BEQ branch destination, and I was done. Cracking often came down to mutating 1 or 2 bytes in the whole system.<p>(BTW, why the downvote? If you think I&#x27;m wrong, post a rebuttal)
评论 #11171399 未加载
评论 #11171734 未加载
评论 #11172262 未加载
评论 #11172169 未加载
评论 #11171696 未加载
评论 #11171373 未加载
geertjabout 9 years ago
I&#x27;ve been very impressed with what I&#x27;ve learned in the last few weeks regarding Apple&#x27;s efforts to provide privacy for its customer using what it seems some very robust engineering and design. I&#x27;m currently an Android user (Samsung S6 edge) but am considering seriously going back to the iPhone because of this.<p>The cynical side of me says that Apple&#x27;s marketing tactics have worked. But I&#x27;ve got a feeling, heck, I <i>want</i> to believe, that this is actually driven by company values and not a short-term marketing benefit.
评论 #11175905 未加载
评论 #11174286 未加载
评论 #11174457 未加载
评论 #11174714 未加载
评论 #11174241 未加载
JustSomeNobodyabout 9 years ago
A lot of the comments on that article burn me up. People in the U.S. really think there&#x27;s a terrorism problem here. The only problem is that government spending so much money on a non-issue! Politicians love to &quot;debate&quot; it because they know it is one of those things that looks good to the naive citizens but they really don&#x27;t have to do anything because there&#x27;s nothing to be done.
评论 #11171880 未加载
评论 #11172448 未加载
评论 #11171867 未加载
评论 #11178103 未加载
abaloneabout 9 years ago
It&#x27;s important to emphasize something: iCloud will always be &quot;backdoored&quot;, by design, and backing up to iCloud is what most users should and will be doing.<p>The reason iCloud data will always be accessible by Apple, and thus governments, is not because Apple wants to make it accessible to governments. It&#x27;s so that Apple can offer customers the very important feature of accessing their own data if they forget or otherwise don&#x27;t have the password. That is an essential feature, and why this aspect will never change.<p>When someone passes away, for example, it would be a terrible compounding tragedy if all their photos from their whole life passed away along with them, because they didn&#x27;t tell anyone their password or where they kept the backup key. So Apple wants and needs to provide an alternative way to recover the account. (For example, they will provide access to a deceased person&#x27;s account if their spouse can obtain a court order proving the death and relationship.)<p>Harvard recent published a paper (called &quot;Don&#x27;t Panic&quot;) that essentially states the same.[1] Governments shouldn&#x27;t &quot;panic&quot; because in most cases, consumers will not be exclusively using unbreakable encryption, because it has tradeoffs that aren&#x27;t always desirable.<p>And the reason why most consumer should be backing up to iCloud is similar: that&#x27;s how you prevent the tragedy of losing your data if you lose your phone.<p>Just something to keep in mind when discussing the &quot;going dark&quot; and &quot;unhackable&quot; news items.<p>It is worth noting however that people who do &quot;have something to hide&quot; from governments probably won&#x27;t be using iCloud, if they know what they&#x27;re doing. Then again if they know what they&#x27;re doing, they wouldn&#x27;t use anything that is backdoored anyway. So the naive criminals will still probably be hackable, and that&#x27;s about all we can hope for.<p>[1] <a href="https:&#x2F;&#x2F;cyber.law.harvard.edu&#x2F;pubrelease&#x2F;dont-panic&#x2F;Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf" rel="nofollow">https:&#x2F;&#x2F;cyber.law.harvard.edu&#x2F;pubrelease&#x2F;dont-panic&#x2F;Dont_Pan...</a>
评论 #11171625 未加载
评论 #11171425 未加载
评论 #11172437 未加载
评论 #11171596 未加载
评论 #11171503 未加载
评论 #11173317 未加载
评论 #11172491 未加载
评论 #11171630 未加载
评论 #11171575 未加载
kazinatorabout 9 years ago
This is all just theatre. The real motivation is to control the platform: to ship a piece of hardware that dictates who can install stuff on it, instead of the traditional hardware that lets you completely overwrite everything in it if you have physical access.<p>Since 197X, people had home computers (and institutional computers for two decades before that) on which the FBI could install anything they want, if that equipment fell into their hands. This fact never made news headlines; it was taken for granted that the computer is basically the digital equivalent of a piece of stationery, written in pencil.<p>There is nothing wrong with that situation, and on such equipment, you can secure your <i>data</i> just fine.<p>No machine can be trusted if it fell under someone&#x27;s physical access. Here is a proof: if I get my hands on your device, I can <i>replace</i> it with a physically identical device which looks exactly like yours, but is actually a man-in-the-middle (MITM). (I can put the fake device&#x27;s board into your original plastic and glass, so it will have the same scratches, wear, grime pattern and whatever other markings that distinguish the device as yours.) My fake device will collect the credentials which you enter. Those are immediately sent to me and I play them against the real device to get in.<p>Apple are trying to portray themselves as a champion of security, making clueless users believe that the security of a device rests in the manufacturer&#x27;s hands. This could all be in <i>collaboration</i> with the FBI, for all we know. Two versions of Big Brother are playing the &quot;good guy&#x2F;bad guy&quot; routine, so you would trust the good guy, who is basically just one of the faces of the same thing.
评论 #11175367 未加载
评论 #11175517 未加载
n0usabout 9 years ago
What is to stop the DOJ from requiring them to produce a phone that has a hardware backdoor? If they are required to produce a software backdoor then building an iphone which is immune to such vulnerabilities seemingly solves that problem but I don&#x27;t see the leap towards compelling Apple to build vulnerabilities into hardware as a large one.<p>I&#x27;m not well versed in security so excuse me for my ignorance but what if there were a way to solder chip onto the board that allows access to the secure enclave. Every time an iphone is made a companion chip is produced that contains some kind of access key which only works for that device and someone is required to foot the bill for storing them.
评论 #11171238 未加载
评论 #11171581 未加载
评论 #11171309 未加载
评论 #11172746 未加载
评论 #11171226 未加载
alfiedotwtfabout 9 years ago
If you want to keep a secret, you must also hide it from yourself&quot;<p><pre><code> - George Orwell, 1984 - Apple, 2016</code></pre>
评论 #11172027 未加载
评论 #11172368 未加载
评论 #11172896 未加载
Evolvedabout 9 years ago
@everyone: All this hubbub and no guarantee the phone wasn&#x27;t already wiped and&#x2F;or doesn&#x27;t contain any sensitive information because they didn&#x27;t use that phone for those purposes.<p>@Udik: I could just keep my tax documents in printed plaintext on top of my dresser but I opt to keep them locked up. Privacy and security are important. If people who utilize privacy&#x2F;security tools are up to no good then why does the U.S. Gov&#x27;t have a clause for not revealing information due to State Secrets? Why do we set our Facebook profiles to private? Why have passwords at all on anything? Are you beginning to see the point?
condour75about 9 years ago
that&#x27;s the endgame of government surveillance requests: it&#x27;s increasingly in a company&#x27;s best interest to have the best security possible so they can&#x27;t be compelled to hack their own devices.
评论 #11171219 未加载
评论 #11171237 未加载
drcodeabout 9 years ago
Darn... this, along with the fact that the MacBook Pro my work gave me is so much better than I expected, is making it harder for me not to become full-on Apple convert.
nickpsecurityabout 9 years ago
My last write-up on smartphone risks applies to this discussion.<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10906999" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10906999</a><p>Apple is far from having a secure phone right now. NSA certainly has ways to bypass this based on my attack framework and their prior work. They just don&#x27;t want them to be known. They pulled the same stuff in the past where FBI talked about how they couldn&#x27;t beat iPhones but NSA had them in the leaks &amp; was parallel constructing to FBI. So, the current crop are probably compromised but reserved for targets worth the risk.<p>That said, modifying CPU to enable memory + I&#x2F;O safety, restricting baseband, an isolation flow for hardware, and some software changes could make a system where 0-days were rare enough to be worth much more. Oh yeah, they&#x27;ll have to remove the debugging crap out of their chips and add TEMPEST shielding. Good luck getting either of those two done. ;)
评论 #11171812 未加载
ianamartinabout 9 years ago
What I want is a service that deletes all my online presence after I die. A deadswitch. All texts, messages, emails, facebook posts, pictures anywhere, <i>everything</i>.<p>I want it all to go when I do. Hell, I want some of it to go now.<p>After I&#x27;m gone, I want to leave no part of my existence on the internet.<p>I realize that&#x27;s not possible. But I want to minimize my footprint.<p>It is totally possible for a local device. I have a deadswitch on all my computers. If I don&#x27;t log in and set an alive flag via the command line in any of my computers for more than a week, that computer securely wipes itself.<p>Let it be known, I have nothing to hide. I just think this is the best way to do things.<p>Edit: My reason for this is the frequency with which I encounter people who are no longer alive. It&#x27;s a harsh thing to look at a link to someone who said something, and you used to know and then suddenly realize, &quot;Oh shit. He&#x27;s dead. And I used to be his best friend.&quot;<p>I know facebook has memorial pages, but those are difficult to get.
评论 #11172273 未加载
评论 #11172098 未加载
wahsdabout 9 years ago
One aspect of what all this comes down to is that governments don&#x27;t want to have to do real work or even prioritize their tracking and surveillance.<p>What encryption and security really does is create scarcity of access to information and data in order to force a market solution where government groups have to prioritize their efforts and apply them deliberately.
评论 #11171493 未加载
studentrobabout 9 years ago
Good. Congress shall pass no law abridging freedom of speech, and code has been ruled free speech.<p>The only reason previous wiretapping laws were passed is because they weren&#x27;t in the limelight and the public never had a chance to weigh in. <i>Let&#x27;s make this an election issue</i>
评论 #11171524 未加载
评论 #11171510 未加载
评论 #11171508 未加载
zobzuabout 9 years ago
&quot;Impossible for security agency to hack&quot;<p>Nothing is 100% proof, crypto certainly isn&#x27;t. It&#x27;s going from child&#x27;s play to &quot;you actually need to knowledge&quot; to &quot;this is actually hard now&quot; (but.. not impossible).
评论 #11173271 未加载
jarcoalabout 9 years ago
Don&#x27;t they just need to tell people to switch away from 4 or 6 digit pins and use longer passwords?
评论 #11171222 未加载
评论 #11171817 未加载
评论 #11171402 未加载
评论 #11171512 未加载
jarjouraabout 9 years ago
Hmmm... this absolutest attitude by Apple begs the question for me, are we SURE we want to have phones that absolutely cannot be unlocked when the owner is no where to be found&#x2F;dead?<p>It&#x27;s such a grey area and I will probably get down voted for commenting this way. I 100% agree that the power, in the wrong hands, is horrible, but can&#x27;t we talk about this in a way where there&#x27;s some kind of middle ground? All I&#x27;ve been reading are either extremes.
评论 #11172065 未加载
评论 #11172067 未加载
评论 #11172939 未加载
评论 #11173439 未加载
drdreyabout 9 years ago
The original story has changed its title to &quot;Apple Is Said to Be Trying to Make It Harder to Hack iPhones&quot;.<p>I was a bit surprised by the clickbait-y nature of the HN title, but we can see in the nytimes URL that this &quot;Apple Is Said to Be Working on an iPhone Even It Can’t Hack&quot; was the original title, eh.
draw_downabout 9 years ago
They&#x27;d have to be crazy not to. Weird that no one else who makes phones seems to give a shit, though.
awqrreabout 9 years ago
The problem with software is that none have been 100% secure yet... I doubt that Apple will be able to achieve that in the near future. Someone should send a phone to John Mcafee at the very least [1][2] ...<p>1. <a href="http:&#x2F;&#x2F;www.pcgamer.com&#x2F;john-mcafee-on-his-fbi-iphone-hack-offer-our-government-is-illiterate-in-cybersecurity&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.pcgamer.com&#x2F;john-mcafee-on-his-fbi-iphone-hack-of...</a><p>2. <a href="http:&#x2F;&#x2F;arstechnica.com&#x2F;staff&#x2F;2016&#x2F;02&#x2F;mcafee-will-break-iphone-crypto-for-fbi-in-3-weeks-or-eat-shoe-on-live-tv&#x2F;" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;staff&#x2F;2016&#x2F;02&#x2F;mcafee-will-break-iphon...</a><p>edit: added source #2; see Google for additional sources...
评论 #11171291 未加载
评论 #11171525 未加载
blinkingledabout 9 years ago
Could Apple not push an OS update that can compromise everything they are doing to make the iPhone unhackable? As long as user has to trust Apple there&#x27;s always going to be the possibility that FBI&#x2F;NSA&#x2F;Whoever force Apple to update a target&#x27;s iPhone to enable tracking&#x2F;recording of whatever information.<p>It&#x27;s not an attainable goal in practice. Today they generate a per device customized update that can be installed without user intervention. Even if they tomorrow enforce user intervention they still retain the capability to push a targeted update for a specific device on law enforcement&#x2F;court order. The user has no way of telling what the update did.
评论 #11171916 未加载
评论 #11171914 未加载
zekevermillionabout 9 years ago
The article doesn&#x27;t cite a source. It doesn&#x27;t even say that it is anonymously sourced from someone close to Apple (who presumably is leaking). That makes me wonder if the real source of this info is Apple-approved, and sort of an indirect way of engaging policymakers. I get the sense that Apple is picking a fight b&#x2F;c the DOJ has violating an unwritten agreement, basically that Apple will provide all the help requested, informally, as long as the DOJ doesn&#x27;t push for court orders or new laws that tie Apple&#x27;s hands in constructing its devices and the software that runs on them.
评论 #11171649 未加载
parkej60about 9 years ago
When will personal technology legally be considered an extension of our minds?<p>Full disclosure I understand this was a persons work phone. This is a statement which is solely being posted to stimulate theoretical discussion.
wantreprenr007about 9 years ago
As much as I &lt;3 Apple, they&#x27;re still a SPoF just like Lavabit or anyone else with centralized servers that aren&#x27;t &quot;SWAT-resistant.&quot; If iDevices could work without iCloud and usefully communicate with each other directly (sans cell network too), that would be impressive... storage, processing and wireless tech are all getting cheaper... p2p &quot;iCloud&quot; might be within the realm of not-quite-insane.<p>(Somehow, I feel iMessage and related apps are MITMable because there is no mandatory, mutual, out-of-band validation of a recipient&#x27;s identity.)
malandrewabout 9 years ago
If Congress does pass such laws, I would love it if Apple considered security so important to it&#x27;s product vision that they&#x27;d be willing to use their cash reserves to restructure the company and engineering and moving it&#x27;s security engineering to a country that pledges never to force it to compromise on security. Apple is no stranger to keeping internal secrets and keeping concerns isolated. I have no doubt that they could find a way to guarantee security. IMHO governments are security bugs to be patched.
beshrkayaliabout 9 years ago
If this means that there&#x27;s going to be some hardware measures in the iPhone itself that would prevent multiple passcode entry attempts then that&#x27;d be good. Otherwise, as long there&#x27;s that &quot;troubleshooting&quot; system that can update&#x2F;reinstall the firmware without the passcode and all measures taken to prevent brute forcing the passcode out are built in the software, it&#x27;s all talk. There&#x27;s nothing enlightening in this article.
nxzeroabout 9 years ago
Unless the implementation is public and verifiable, which is unlikely, the idea that there is a &quot;secure&quot; iPhone is just that, an idea.
bunkydooabout 9 years ago
This marks a very interesting time in my opinion. We have corporations with more money with governments making (or at least attempting to make) certain social decisions once reserved for only public sector government officials. If Apple is successful here, it will usher in a new era of what a private company can do.
riquitoabout 9 years ago
They can have perfect hardware crypto, but they can always send a new OS update to every phone with &quot;if your account id is in top 100 wanted, send a copy of everything to x.y.z&quot;. Nobody would ever know (until it&#x27;s too late, at least)<p>(of course if the phone is not in use anymore it doesn&#x27;t apply)
gaiaabout 9 years ago
My Nexus 6 running Android 6.0.1 is encrypted and uses hardware backed credential storage.<p>If the software (Android) had the same type of protection (if the wrong PIN is entered 10 times it destroys the key), would this device be at par with the iOS approach?
Aoyagiabout 9 years ago
So what are the odds that this is just an act, whether Apple knows about it or not?
joezydecoabout 9 years ago
Could DOJ slap Apple with an injunction forbidding deployments of new iOS releases until the San Bernadino case is concluded?<p>If Apple can&#x27;t launch new iOS versions, can they still launch new iPhones?
评论 #11171513 未加载
Gratsbyabout 9 years ago
How about you simply encrypt your data store? There&#x27;s no reason you can&#x27;t encrypt things in such a way that your operating system does not have direct access to it.
jokoonabout 9 years ago
I thought they already couldn&#x27;t hack the iPhone.
frbabout 9 years ago
Sorry for the cynicism, but am I the only one feeling that this is a huge marketing stunt for the new iPhone 7 with super encryption?
morninjabout 9 years ago
This is excellent, but unfortunately it will not protect any data on the millions of iPhones that already exist.
评论 #11172624 未加载
emodendroketabout 9 years ago
Can Apple make an iPhone so heavy even they cannot lift it?
alexnewmanabout 9 years ago
Hope they learn how to Build baseband proc
tempodoxabout 9 years ago
Tim Cook has gained my respect over this.
ADRIANFRabout 9 years ago
This title reminds me of a quote from The Simpsons: &quot;Can God create a rock so heavy that even he cannot lift it?&quot;
pmarreckabout 9 years ago
Good.
joering2about 9 years ago
This is one of those moments I wish Jobs was still here.<p>Had he lost to the DOJ, here is what would (might) have happened:<p>- he would gladly unlocked this phone and bill DOJ for the time spent on redesigning IOS<p>- going forward, he would label each phone&#x27;s box in red letters: CONTAINS GOVERNMENT-REQUIRED BACKDOOR (I doubt Gov can forbid him from doing that)<p>- he would then stop selling devices in Apple stores directly and only allow to order them in stores with direct home delivery from Apple website hosted and operated outside USA.<p>- all the shipping would be done directly from China by-passing US-tax system all together.<p>- shortly after he would remove the backdoor IOs for devices that are not directly sold on US soil<p>That would be a big fat middle finger to the DOJ.
评论 #11172753 未加载