Linked by Hadrien Grasland on Wed 25th May 2011 15:09 UTC, submitted by sawboss
Apple 40 minutes and physical access. That's all russian company ElcomSoft is claiming to need in order to crack the 256-bit hardware encryption Apple uses to protect the data on iOS 4 devices. Full access to everything that's stored inside, including "historical information such as geolocation data, browsing history, call history, text messages and emails, usernames, [passwords, and even some] data deleted by the user", is obtained.
Permalink for comment 474746
To read all comments associated with this story, please click here.
Member since:

"And what gives you the idea that the Russians, Chinese, Israelis and French didn't do it?"

I don't know if they can or cannot compile it themselves, but I somewhat doubt microsoft would allow them that privilege.

The thing is, the notion that anyone having the source knows whether windows is secure seems a little implausible.

Vulnerabilities can creep up in innocent looking code. That would always offer plausible denyability.

When a security update comes in, countries in possession of the code could indeed locate the vulnerabilities in the source, but where is the evidence that it was accidental or deliberate? It's not like MS would label a backdoor as "NSAKey" or something.

Reply Parent Score: 2