Hacker tools can directly crack iPhone 12, which is the last thing Apple wants to see

Hacker tools can directly crack iPhone 12, which is the last thing Apple wants to see

[[348473]]

This is definitely not good news for Apple, because its own iPhone can be easily cracked by a third party. According to the latest report from foreign media, law enforcement agencies across the United States have tools to obtain data stored on encrypted iPhones. Currently, at least 2,000 agencies across the country have ways to obtain data to further conduct criminal investigations.

The encryption debate has long revolved around the idea that it is necessary to require phone manufacturers to officially backdoor encryption systems for law enforcement because encryption makes it impossible for law enforcement agencies to obtain evidence from devices and services. But a new report argues that the need for backdoor access is no longer necessary.

If the police cannot complete the task using these tools, they can also send the device to service agencies such as Cellebrite for unlocking. Invoice information shows that Cellebrite charges about $2,000 for unlocking each device, and sold advanced tools to the Dallas Police Department for $150,000. GrayShift's GrayKey cracking tool has not disclosed the specific vulnerabilities that Apple uses, but they can easily crack the entire series of iPhones, even the latest iPhone 12 series, which also puts Apple under great pressure.

Some industry insiders said that the creation of backdoors itself weakens the entire encryption technology because hackers will prioritize attacking the backdoors, which will be used as a quick entry point to more easily access data.

<<:  Cartoon | IPv6 makes every grain of sand under your feet unique

>>:  September operating data of the three major operators: 5G enters the harvest period after entering the "warming up" mode

Blog    

Recommend

Three major problems facing my country's 5G base stations

At present, the development of 5G commercializati...

How will 5G impact the video surveillance and physical security industries?

[[407162]] It’s been a few years, but 5G (fifth g...

Mellanox: Reconstructing the network world with data at the center

Not long ago, as a leading provider of end-to-end...

Expert: China ranks second in the world in terms of the number of IPv6 addresses

[[230257]] The global Internet Protocol (IP) addr...

5G core network, who is responsible for your security?

As we all know, in the 5G era, we are greeted by ...

Will 5G charges be "cheap"? Operators: Not very expensive

From the issuance of 5G commercial licenses to th...

BuyVM Mount Hard Drive Method (Block Storage Slabs)

This month we have shared information about BuyVM...

How does the computing power network work?

In the previous articles, I gave you a detailed i...

5G network construction 80%: 5G robots are about to usher in a new turning point

Recently, according to CCTV News, China had compl...

Five-minute K8S practice - Istio gateway

In the previous issue of k8s-Service Mesh Practic...

HostSolutions: OpenVZ is about to end, free upgrade to KVM

I received an email from HostSolutions that they ...