From: nospam <nospam@nospam.invalid>
Subject: Re: The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Full headers:
Path: news.netfront.net!goblin1!goblin.stu.neva.ru!eternal-september.org!feeder.eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nospam <nospam@nospam.invalid>
Newsgroups: rec.photo.digital,comp.sys.mac.system,comp.sys.mac.apps
Subject: Re: The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Date: Thu, 01 Mar 2018 12:37:04 -0500
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <010320181237047223%nospam@nospam.invalid>
References: <O3ulC.173256$mJ1.28255@fx13.fr7> <ffo2veFk7uiU3@mid.individual.net> <280220181127370843%nospam@nospam.invalid> <barmar-14256C.11355828022018@reader.eternal-september.org> <280220181311413591%star@sky.net> <1u0pxuq8eh5vl$.12khrhaik83zs.dlg@40tude.net> <280220182336381013%star@sky.net> <16js8xeniqzb5$.1rsedrk0gykqk$.dlg@40tude.net> <010320180939330621%star@sky.net> <1m5t0g04z96tw.1d5oa0toqb0ev$.dlg@40tude.net> <p797gs0lac@news2.newsguy.com> <1xxjbobasi29f.1giw1htnrfcsh$.dlg@40tude.net> <010320181154545437%nospam@nospam.invalid> <q02i4iqeqelw$.1xo8ryiboil3b.dlg@40tude.net> <010320181211446034%nospam@nospam.invalid> <1aum23f4mi9xw.130fuu5m3f1qd$.dlg@40tude.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="5331113d00e1fa1c8adf52346a24646c";
logging-data="24450"; mail-complaints-to="abuse@eternal-september.org";posting-account="U2FsdGVkX1/xxidbDdu6v5Fy8JXgKMPt"
User-Agent: Thoth/1.9.0 (Mac OS X)
Cancel-Lock: sha1:Ybq0ZmokET2sD74oOMM3U5ga5Ho=
Print Article
Forward Article
In article <1aum23f4mi9xw.130fuu5m3f1qd$.dlg@40tude.net>, ultred
ragnusen<ultred@ragnusen.com> wrote:
> As just /one/ example of how adversaries attack weak links first, read any
> of the hits from this simple directed search:
> https://duckduckgo.com/?q=crack+encryption+listening+cpu+sounds
> 
> To save you time, this is the first hit:
>
> https://www.extremetech.com/extreme/173108-researchers-crack-the-wor...
> st-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu
 
you might want to actually *read* the links you spew.

  If you want to keep your data secure, you only really have two viable
  options: Heavy-duty encryption, physical security, and ideally both
  at the same time. 

iphones have the former and other than a confiscated phone, they also
have the latter.

not only that, but without the correct passcode, there won't be any
sounds to capture it decrypting anything.

tl;dr you haven't any clue.