From: nospam <nospam@nospam.invalid>
Subject: Re: The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Full headers:
Path: news.netfront.net!goblin2!goblin.stu.neva.ru!newsfeed.xs4all.nl!newsfeed8.news.xs4all.nl!feeder.erje.net!2.eu.feeder.erje.net!eternal-september.org!feeder.eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nospam <nospam@nospam.invalid>
Newsgroups: rec.photo.digital,comp.sys.mac.system,comp.sys.mac.apps
Subject: Re: The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Date: Fri, 02 Mar 2018 10:18:17 -0500
Organization: A noiseless patient Spider
Lines: 36
Message-ID: <020320181018171111%nospam@nospam.invalid>
References: <O3ulC.173256$mJ1.28255@fx13.fr7> <ffo2veFk7uiU3@mid.individual.net> <280220181127370843%nospam@nospam.invalid> <barmar-14256C.11355828022018@reader.eternal-september.org> <280220181311413591%star@sky.net> <1u0pxuq8eh5vl$.12khrhaik83zs.dlg@40tude.net> <280220182336381013%star@sky.net> <16js8xeniqzb5$.1rsedrk0gykqk$.dlg@40tude.net> <010320180939330621%star@sky.net> <1m5t0g04z96tw.1d5oa0toqb0ev$.dlg@40tude.net> <p797gs0lac@news2.newsguy.com> <1xxjbobasi29f.1giw1htnrfcsh$.dlg@40tude.net> <010320181154545437%nospam@nospam.invalid> <q02i4iqeqelw$.1xo8ryiboil3b.dlg@40tude.net> <010320181211446034%nospam@nospam.invalid> <p7bo4601puq@news2.newsguy.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="5b0ebe66ab8ac5c9b856d5b7a26e037d";
logging-data="18803"; mail-complaints-to="abuse@eternal-september.org";posting-account="U2FsdGVkX1/D6SmiiKs+bWdpLeJZeNJP"
User-Agent: Thoth/1.9.0 (Mac OS X)
Cancel-Lock: sha1:JgrEo+/KnqfGsWj/Plm3TAn+2OI=
Print Article
Forward Article
In article<p7bo4601puq@news2.newsguy.com>, PeterN
<"peter,newdelete"@deleteverizon.net> wrote:

> >>>> However, you'll note that I simply stated that no consumer mobile device
> >>>> is secure, simply because they all have the same weak links.
> >>>
> >>> that is false.
> >>
> >> You don't even /know/ what those weak links are.
> > 
> > not only do i know what they are, but i know what's needed to crack
> > iphone encryption. you do not.
> > 
> > all you do is spew nonsense about planes flying overhead (which doesn't
> > actually happen) that scan for imeis, which won't do a damned thing to
> > crack the encryption on the phone itself.
> > 
> > for that, you need the passcode, which if it's complex, will take a few
> > billion years to crack, and the imei won't help you at all,
> 
> If you statement is true, the iPhone has been in existence for several 
> billion + 2 years.

you don't understand modern encryption either.

>
<http://abcnews.go.com/US/fbi-cracked-iphone-encryption-averted-lega...

that was an older iphone 5c which lacks a secure element, was running
an older version of ios with several known exploits and was locked with
a simple 4 digit pin code, making it fairly easy to crack. the fbi lied
under oath when they said they "tried everything". 

iphones now have a secure element, the exploits for the above 5c have
long been patched along with countless others, the ram flash technique
that was almost certainly used will *not* work and the default pin code
length is now 6 digits.