TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Azimuth unlocked iPhone at center of legal battle between the FBI and Apple

112 pointsby ajay-dabout 4 years ago

13 comments

dansoabout 4 years ago
Lots of interesting details in this article, including:<p>- Apple unwittingly tried to hire David Wang, the creator of the exploit<p>- Wang instead went on in 2017 to co-found Corellium, a company specializing in providing &quot;virtual&quot; iPhones for security testing.<p>- Apple sued Corellium in 2019 for copyright violation. The discovery process turned up Wang and his work on the San Bernadino exploit.<p>This is how the article describes the exploit:<p>&gt; <i>Azimuth specialized in finding significant vulnerabilities. Dowd, a former IBM X-Force researcher whom one peer called “the Mozart of exploit design,” had found one in open-source code from Mozilla that Apple used to permit accessories to be plugged into an iPhone’s lightning port, according to the person...</i><p>&gt; <i>Using the flaw Dowd found, Wang, based in Portland, created an exploit that enabled initial access to the phone — a foot in the door. Then he hitched it to another exploit that permitted greater maneuverability, according to the people. And then he linked that to a final exploit that another Azimuth researcher had already created for iPhones, giving him full control over the phone’s core processor — the brains of the device. From there, he wrote software that rapidly tried all combinations of the passcode, bypassing other features, such as the one that erased data after 10 incorrect tries.</i>
评论 #26814472 未加载
exabrialabout 4 years ago
Good!<p>Things I&#x27;m for: targeted, investigative police work, for a specific crime, where it&#x27;s highly likely the warrant issued will find specific evidence, and the crime is of violent nature.<p>Things I&#x27;m against: Warrantless surveillance by the FBI, CIA, NSA, Google, Facebook, your cell carrier, and friends
somepersonabout 4 years ago
Apple is suing Corellium, a maker of iPhone virtualization and pentesting software, because their tool can be used to develop exploits that bypass Apple’s security?<p>It&#x27;s incredibly worrying that Apple is using the legal system to ban virtualization and pentesting software.<p>I am surprised and saddened that Apple is going down that route.
评论 #26807406 未加载
评论 #26809351 未加载
评论 #26807172 未加载
评论 #26809946 未加载
评论 #26807070 未加载
评论 #26808859 未加载
pen2labout 4 years ago
That&#x27;s interesting, because I recall a hoard of articles at that time reporting that the Israeli-based Cellebrite was the one to unlock San Bernadino shooter&#x27;s iPhone for the FBI: <a href="https:&#x2F;&#x2F;www.reuters.com&#x2F;article&#x2F;us-apple-encryption-cellebrite-idUSKCN0WP17J" rel="nofollow">https:&#x2F;&#x2F;www.reuters.com&#x2F;article&#x2F;us-apple-encryption-cellebri...</a>
评论 #26808366 未加载
评论 #26810196 未加载
sneakabout 4 years ago
Note that the promotion of this FBI-vs-Apple narrative benefits Apple.<p>The FBI didn&#x27;t need to unlock the phone, most likely. All iPhones in their default configuration back up the ~entire contents of the phone to Apple each night, with Apple keys. Apple can decrypt this without the phone, the user, or the passcode at any time, invisible to the user.<p>Apple preserves this vulnerability for the FBI, at the FBI&#x27;s request:<p><a href="https:&#x2F;&#x2F;www.reuters.com&#x2F;article&#x2F;us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT" rel="nofollow">https:&#x2F;&#x2F;www.reuters.com&#x2F;article&#x2F;us-apple-fbi-icloud-exclusiv...</a><p>Apple turns over this data without a warrant frequently (over 30,000 users in 2019) according to Apple&#x27;s own transparency reports. They also turn it over in response to warrants, as they have plainly stated that they did in this case.<p>You don&#x27;t need access via the front door if you have it via the back door.
评论 #26812148 未加载
mkjabout 4 years ago
&gt; open-source code from Mozilla that Apple used to permit accessories to be plugged into an iPhone’s lightning port<p>Anyone know what software (library?) that is referring to?
评论 #26808479 未加载
评论 #26810024 未加载
1cvmaskabout 4 years ago
Many people and groups offered to unlock the phone, even for free as a PR stunt. Even Mcafee:<p><a href="https:&#x2F;&#x2F;www.businessinsider.com&#x2F;john-mcafee-ill-decrypt-san-bernardino-phone-for-free-2016-2" rel="nofollow">https:&#x2F;&#x2F;www.businessinsider.com&#x2F;john-mcafee-ill-decrypt-san-...</a>
评论 #26808622 未加载
somepersonabout 4 years ago
Full article: <a href="https:&#x2F;&#x2F;archive.md&#x2F;HaOqY" rel="nofollow">https:&#x2F;&#x2F;archive.md&#x2F;HaOqY</a>
nojitoabout 4 years ago
Pretty interesting how apple patched many of these exploits recently.<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;pandrewhk&#x2F;status&#x2F;1381260920635027459?s=21" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;pandrewhk&#x2F;status&#x2F;1381260920635027459?s=2...</a>
评论 #26808309 未加载
notmine1337about 4 years ago
Reminds me the intro of <a href="https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2020&#x2F;12&#x2F;an-ios-zero-click-radio-proximity.html" rel="nofollow">https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2020&#x2F;12&#x2F;an-ios-zero-c...</a> and <a href="https:&#x2F;&#x2F;www.vice.com&#x2F;en&#x2F;article&#x2F;8xdayg&#x2F;iphone-zero-days-inside-azimuth-security" rel="nofollow">https:&#x2F;&#x2F;www.vice.com&#x2F;en&#x2F;article&#x2F;8xdayg&#x2F;iphone-zero-days-insi...</a>
paulpauperabout 4 years ago
Goes to show how encryption tends to fall short against a determined enough advisary
评论 #26811372 未加载
vzalivaabout 4 years ago
Why HN is promoting paywalled articles? I am the only person here who does not have WaPo subscription?
评论 #26809288 未加载
评论 #26809315 未加载
splithalfabout 4 years ago
Australians are the best.
评论 #26808370 未加载
评论 #26808332 未加载
评论 #26807659 未加载