Apple may not like the FBI’s new alternative to ‘GovtOS’ – BGR
The FBI has seeminglyÂ admitted defeat to Apple in its quest to force the company to build an insecure version of its OS to load onto the iPhone owned by San Bernardino shooter Syed Farook. And that might be a good thing. However, a public court battle between Apple and the FBI might have been a lot better, even if Apple risked being forced to unlock the iPhone.
DONâ€™T MISS: Apple stared down the FBI and won
Talking to CNBC, cyber security specialist John McAfee warns thatÂ Apple might not like the FBIâ€™s new alternative method for unlocking the iPhone 5c, even though theyâ€™ll be doing so without Appleâ€™s help.
â€œApple and Tim Cook are not going to be happy with what the FBI has come up with,â€ he said. â€œItâ€™s not worse than a universal master key, but itâ€™s much much easier to get into a phone with it.â€
McAfee, whoâ€™s been known lately for his rather erratic remarks and behavior, did not elaborate on the matter, but he said heâ€™s not â€œfond of it.â€ His security expertise is still worth paying attention to, regardless of the crazy things he might say or do. In this case, he also told CNBC that the FBI realized that â€œhackers can [access the iPhone], and thatâ€™s whatâ€™s happened here.â€
Ironically, the FBIâ€™s actions also help Appleâ€™s case: If thereâ€™s a security flaw in the iPhone â€“ like the proposed GovtOS the FBI wants from Apple â€“ someone will find it and use it to harmÂ the safety of consumers.
Itâ€™ll certainly be interesting to see whether the FBI will disclose the security hole to Apple. It doesnâ€™t have to do it, if it chooses not to pursue the matter in courts. Itâ€™s also unclear whether the technique itâ€™s using to unlock the San Bernardino iPhone would also work on newer iPhones.
The agency wants to use a brute force attack to crack the PIN of the iPhone, combined with a memory mirroring technique that lets it copy the entire contents of the storage to avoid it being deleted in case the device is set to delete itself after 10 wrong PIN attempts.
Write a Reply or Comment:
You must be logged in to post a comment.