Hacker tools can directly crack iPhone 12, which is the last thing Apple wants to see

Hacker tools can directly crack iPhone 12, which is the last thing Apple wants to see

[[348473]]

This is definitely not good news for Apple, because its own iPhone can be easily cracked by a third party. According to the latest report from foreign media, law enforcement agencies across the United States have tools to obtain data stored on encrypted iPhones. Currently, at least 2,000 agencies across the country have ways to obtain data to further conduct criminal investigations.

The encryption debate has long revolved around the idea that it is necessary to require phone manufacturers to officially backdoor encryption systems for law enforcement because encryption makes it impossible for law enforcement agencies to obtain evidence from devices and services. But a new report argues that the need for backdoor access is no longer necessary.

If the police cannot complete the task using these tools, they can also send the device to service agencies such as Cellebrite for unlocking. Invoice information shows that Cellebrite charges about $2,000 for unlocking each device, and sold advanced tools to the Dallas Police Department for $150,000. GrayShift's GrayKey cracking tool has not disclosed the specific vulnerabilities that Apple uses, but they can easily crack the entire series of iPhones, even the latest iPhone 12 series, which also puts Apple under great pressure.

Some industry insiders said that the creation of backdoors itself weakens the entire encryption technology because hackers will prioritize attacking the backdoors, which will be used as a quick entry point to more easily access data.

<<:  Cartoon | IPv6 makes every grain of sand under your feet unique

>>:  September operating data of the three major operators: 5G enters the harvest period after entering the "warming up" mode

Recommend

Virtono: $24.9/year KVM-1GB/30GB/2TB/Japan & Singapore & Hong Kong, China, etc.

Virtono recently launched a new promotion on LET,...

Teach you how to distinguish inferior cables

1. The harm of fake and inferior wires Electric w...

Analysis of 5G network security issues

The fifth generation of mobile communication tech...

TmhHost Hong Kong CN2 high-defense server online and simple test

TmhHost recently launched the Hong Kong CN2 high-...

When to use 5G and Wi-Fi 6?

We’ve seen a lot of hype around 5G cellular and W...

Popular Science on 5G Technology and Standards You Must Know

In 2017, the application of 5G technology has bec...

...