Хабр Курсы для всех
РЕКЛАМА
Практикум, Хекслет, SkyPro, авторские курсы — собрали всех и попросили скидки. Осталось выбрать!
UID key (device's unique ID key) is an AES 256-bit hardware key, unique to each iPhone. It's fused into the application processor during manufacturing.… In later iOS versions, it is used to encrypt the entire file system, so that the flash chips cannot moved to another device and read out there again.
Every iOS device has a dedicated AES 256 crypto engine built into the DMA path
between the flash storage and main system memory, making file encryption highly
efficient.
The device’s unique ID (UID) and a device group ID (GID) are AES 256-bit keys fused (UID) or compiled (GID) into the application processor during manufacturing. No software or firmware can read them directly; they can see only the results of encryption or decryption operations performed using them. The UID is unique to each device and is not recorded by Apple or any of its suppliers. The GID is common to all processors in a class of devices (for example, all devices using the Apple A8 processor), and is used as an additional level of protection when delivering system software during installation and restore. Integrating these keys into the silicon helps prevent them from being tampered with or bypassed, or accessed outside the AES engine. The UID and GID are also not available via JTAG or other debugging interfaces.
The UID allows data to be cryptographically tied to a particular device. For example, the
key hierarchy protecting the file system includes the UID, so if the memory chips are
physically moved from one device to another, the files are inaccessible. The UID is not
related to any other identifier on the device.…
The passcode is entangled with the device’s UID, so brute-force attempts must
be performed on the device under attack.
Думаю что с людьми они ничего общего не имеют.Как раз типичное для людей поведение. Всего каких-то 70 лет назад всем миром так развлекались, это в последнее время немного успокоились, а до этого регулярно резали головы и устраивали друг другу массовые казни.

Justice Department decided not to wait for Apple’s response, noting in its motion today that Apple CEO Tim Cook had already indicated in a public statement posted to Apple’s web site Tuesday that his company would not comply.
APPLE INC’S MOTION TO VACATE ORDER COMPELLING APPLE INC. TO ASSIST AGENTS IN SEARCH, AND OPPOSITION TO GOVERNMENT’S MOTION TO COMPEL ASSISTANCE
Hearing:
Date: March 22, 2016
Time: 1:00 p.m.
Place: Courtroom 3 or 4
Judge: Hon. Sheri Pym
This is not a case about one isolated iPhone. Rather, this case is about the
Department of Justice and the FBI seeking through the courts a dangerous power that
Congress and the American people have withheld: the ability to force companies like
Apple to undermine the basic security and privacy interests of hundreds of millions of
individuals around the globe.…
The order demanded by the government compels Apple to create a new
operating system—effectively a “back door” to the iPhone—that Apple believes is too
dangerous to build. Specifically, the government would force Apple to create new
software with functions to remove security features and add a new capability to the
operating system to attack iPhone encryption, allowing a passcode to be input
electronically. This would make it easier to unlock the iPhone by “brute force,” trying
thousands or millions of passcode combinations with the speed of a modern computer.
In short, the government wants to compel Apple to create a crippled and insecure
product. Once the process is created, it provides an avenue for criminals and foreign
agents to access millions of iPhones. And once developed for our government, it is
only a matter of time before foreign governments demand the same tool.
The government says: “Just this once” and “Just this phone.” But the
government knows those statements are not true; indeed the government has filed
multiple other applications for similar orders, some of which are pending in other
courts.2
And as news of this Court’s order broke last week, state and local officials
publicly declared their intent to use the proposed operating system to open hundreds of
other seized devices—in cases having nothing to do with terrorism.3
If this order is permitted to stand, it will only be a matter of days before some other prosecutor, in
some other important case, before some other judge, seeks a similar order using this
case as precedent. Once the floodgates open, they cannot be closed, and the device
security that Apple has worked so tirelessly to achieve will be unwound without so
much as a congressional vote.
Суд обязал Apple помочь ФБР в разблокировании смартфона террориста, Apple больше не хочет помогать