How Locked iPhones are Being Cracked - Technical

preview_player
Показать описание
Extractor companies sell technologies to companies around the world that enable them to crack locked iOS devices and decrypt the data on the disk. We analyze how.

#mobilesecurity #encryption #cybersecurity
Рекомендации по теме
Комментарии
Автор

this video is fucking perfect for my digital forensics group project, thank you for being the first place ive found online that actually goes in depth explainin how data is extracted instead of just saying "they connect it to lab equipment and perform physical or logical extraction". even my lecture slides dont come close to this in depth

itsoowan
Автор

To prevent hacking, remove half of the battery and pack C4 in the empty space which activates on detection of usb cable being plugged in. Just an idea that seems doable.

WaywardPondering
Автор

Discovered a goldmine of information in this channel! Highly technical yet highly enjoyable as well. Keep up the good work!

johnt.
Автор

AI generated voice is well done but you can still tell.

Pimck
Автор

When it comes to the brute force attacks, the best protection is to still use an alphanumeric password and not just some digits as passcode. This increases the time needed to crack from hours to years, giving you enough time to wipe the phone from your online account or simply rendering many data on the phone obsolete over so much time, especially saved login-data for 3rd parties.

LegioXXI
Автор

I think you need to advertise this channel...
It has good content but it’s not getting out there

I stumbled on this by accident but the content is mind blowing

adrienagreste
Автор

one of my favorite channels rn. don't stop making content !

souhailtag
Автор

How does lockdown mode work to prevent unauthorized access via these methods? Always wondered what additional measures are in place to prevent someone from cracking the passcode via cable, etc.

everettvincent
Автор

Seriously, I completely understand why it is almost impossible to write a complex software like a web browser without vulnerabilities. But WHY it's so hard to write 2-4Kb boot ROM or TPM firmware without CRITICAL vulnerability?? I wish one day Apple/Qualcomm hires someone from industrial or aerospace sector just to write a simple and secure boot firmware for their new chip.
Successful attack to a "data at rest" makes me mad

alexk
Автор

Cold boot attacks, basically they are able to extract encryption keys that are locally stored in the memory before the storage is booted. Once those keys are obtained they can easily decrypt the data. They also imitate the DNS of apple servers

seansingh
Автор

0:19 Shouldn't the emphasis in the name of Belarus be on the last syllable?

VulcanOnWheels
Автор

What of they’re on a new version of iOS that doesn’t have a jailbreak yet?

Martin
Автор

Really well explained! I love that you didn't mix up or wrongly interpret the technical data! Makes for a very factual and informative video

kevinwydler
Автор

how does it look like on the legal side of life given the software is the property of manufacturer? can these companies not be sued by Apple or have the tools banned?

LaythSlewa-xumq
Автор

08:30 This suggests an armsrace between methods to crack and methods to protect. A good argument for buying the latest flagship - or at least one every second year.

Melker
Автор

Where can I find this program? Thank you very much.

pierpa_pierpaolo
Автор

With AI emerging this is going to be a growing cat and mouse game

jspenceryt
Автор

demoting the device to JTAG is not a older standard, its a different connection allowing direct console readout

benNdaKen
Автор

This was a good video! I cannot tell if the voice was AI or not though.

oglothenerd
Автор

so can i buy cheap locked phones or not?

FutureToneLabs
visit shbcf.ru