Apple security flaw means police can crack a suspect's iPhones 

Mail Online | 7/10/2018 | Tim Collins For Mailonline
nallynally (Posted by) Level 4
Click For Photo: https://i.dailymail.co.uk/i/newpix/2018/07/10/11/4E14DD3C00000578-0-image-a-19_1531219623570.jpg


Click For Video: http://video.dailymail.co.uk/video/mol/2017/09/06/3541973282377059524/1024x576_MP4_3541973282377059524.mp4

Less than 24 hours after Apple revealed a new 'cracking defence tool', security researchers have found a way to get around it.

The tool, issued as part of the iOS 11.4.1 update yesterday, blocks passcode cracking tools used by law enforcement to access iPhones without permission.

USB - Restricted - Mode - IPhone - Software

Called USB Restricted Mode, it is meant to make an iPhone unaccessible to third-party software after its screen has been locked for one hour.

This means that law enforcement, hackers or any one else who wants to copy the contents of your phone to a computer, flash drive or similar device are out of luck.

Experts - Accessory - Steps - Hour - Screen

However, experts found that if you plug in an accessory and follow some simple steps before the hour screen lock cut off, you can get around this restriction.

'USB Restricted Mode', released on Monday, is designed to protect against USB accessories that connect to the iPhone's Lightning port.

US - Law - Enforcement - Agencies - Technology

It came after it was revealed that US law enforcement agencies were eyeing a technology called 'GrayKey', which can easily crack open locked iPhones using the port.

The workaround was discovered by cybersecurity firm ElcomSoft, based in Moscow.

ElcomSoft - Lightning - Accessory - Lightning - Camera

ElcomSoft connected a compatible Lightning accessory, the official Lightning to USB 3 Camera Adaptor, before the screen had been locked for an hour.

They then connected the iPhone an external battery pack to the adaptor, to avoid the iPhone's battery draining and the device powering down.

Assembly - Faraday - Bag - Wireless - Signals

They then placed the entire assembly in a Faraday bag, which blocks wireless signals from entering.

Writing on the site, researcher Oleg Afonin said: 'According to our tests, this effectively disables USB Restricted Mode countdown timer, and allows safely transporting the seized device to the lab.'

Handset - Access - Memory - Information

That means whoever has the handset is free to access its internal memory and whatever information that contains.

'What are the chances that the device is seized within...
(Excerpt) Read more at: Mail Online
Wake Up To Breaking News!
He is faithful!
Sign In or Register to comment.

Welcome to Long Room!

Where The World Finds Its News!