Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

iPhone brute force hardware already exists [1]. The issue is that when Touch ID and/or a passcode is enabled, the device locks itself for a few seconds-a few hours every time an incorrect pin is entered. So brute forcing would take an extremely long time.

In addition, there is a setting on all iPhones to erase data after 10 failed pin code entry attempts.

The FBI wants Apple to provide a custom iOS build that can be installed on the device that allows for remote (over the network) brute forcing with the increasing timeout/erase data protections totally disabled.

1. http://techcrunch.com/2015/03/19/iphone-bruteforce-pin/



But how can the custom iOS build be installed on the device while it is locked?


"The SIF will be loaded via Device Firmware Upgrade ("DFU") mode, recovery mode, or other applicable mode available to the FBI."


DFU/Recovery wipes the device.


You are of course correct. I edited my comment.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: