Хабр Курсы для всех
РЕКЛАМА
Практикум, Хекслет, SkyPro, авторские курсы — собрали всех и попросили скидки. Осталось выбрать!
недоступен для вычитывания.
Но там же написано, что GID успешно извлекли еще в 2011-м.
Т.е. проверять пин-код можно только на самом устройстве.
According to this March 2015 article in The Intercept based on documents provided by Edward Snowden, the CIA has been particularly interested in figuring out how to extract GID keys as part of their efforts to get access to modifying iOS to insert spy software and to research further vulnerabilities:
«At the 2011 Jamboree conference, there were two separate presentations on hacking the GID key on Apple’s processors. One was focused on non-invasively obtaining it by studying the electromagnetic emissions of — and the amount of power used by — the iPhone’s processor while encryption is being performed. Careful analysis of that information could be used to extract the encryption key. Such a tactic is known as a „side channel“ attack. The second focused on a „method to physically extract the GID key.'“(The first document and the second one.)
»According to the 2011 document describing the Jamboree presentations on Apple's processor, the researchers asserted that extracting the GID key could also allow them to look for other potential gateways into Apple devices. 'If successful, it would enable decryption and analysis of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the iPod touch and the iPad.'"
(U)… The Apple A4 processor contains an on-board, AES cryptographic key called the Global ID (GID) that is believed to be shared across all current «iDevices»
Anti-fuse technology is the best alternative for keeping this data safe. Tampering using passive techniques such as current profiling to determine the word pattern is unsuccessful with anti-fuse. This results because anti-fuse bitcell current for “0”s and “1”s are much smaller than the current required for sensing or to operate the peripheral circuits to read the memory.
Tampering using invasive techniques such as scanning electron microscope (SEM) passive voltage contrast likewise has difficulty isolating the anti-fuse bitcell within the crosspoint memory array. Furthermore, it is difficult using chemical etching or mechanical polishing to locate the anti-fuse oxide breakdown.
в микроскопе найти ROM внутри SoC… и считать побитово.
We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.
We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.
The ruling by Magistrate Judge Sheri Pym, a former federal prosecutor, requires Apple to supply highly specialized software the FBI can load onto the county-owned work iPhone to bypass a self-destruct feature, which erases the phone's data after too many unsuccessful attempts to unlock it. The FBI wants to be able to try different combinations in rapid sequence until it finds the right one.
The order, signed Tuesday by a magistrate judge in Riverside, Calif., does not ask Apple to break the phone’s encryption but rather to disable the feature that wipes the data on the phone after 10 incorrect tries at entering a password. That way, the government can try to crack the password using “brute force” — attempting tens of millions of combinations without risking the deletion of the data.
All Writs Act от 1789 года
ФБР хочет чтобы мы сделали новую версию операционной системы для iPhone, обходящую несколько важных элементов безопасности, и установили ее на восстановленный в ходе расследования iPhone. В неверных руках такое программное обеспечение, которое на данный момент не существует, сможет разблокировать любой iPhone к которому имеется физический доступ.
...the government requests that Apple be ordered to provide the FBI with a custom signed iPhone Software («IPSW») file, recovery bundle, or other Software Image File («SIF») that can be loaded onto the SUBJECT DEVICE.… Importantly, the SIF would be created with a unique identifier of the SUBJECT DEVICE so that the SIF would only load and execute on the SUBJECT DEVICE… As an alternative, the government would be willing to test the passcodes remotely while the SUBJECT DEVICE is in Apple's possession
Открытое письмо Тима Кука о давлении ФБР на Apple