You know, the same thing happens to me every time the FBI takes my phones.

  • @[email protected]OP
    link
    fedilink
    773 months ago

    “Adams claimed that after he learned about the investigation into his conduct, he changed the password,” and he “increased the complexity of his password from four digits to six,” the document reads. Adams said he did this to stop members of his staff “from inadvertently or intentionally deleting the contents of his phone because, according to Adams, he wished to preserve the contents of his phone due to the investigation.”

    Sure thing, bud.

    • Jay
      link
      fedilink
      English
      193 months ago

      Wow… I could dream up more realistic excuses in middle school.

    • masterofn001
      link
      fedilink
      123 months ago

      6 digits is brute force hackable in about 1 second.

      Also, isn’t lying to the FBI another crime?

        • masterofn001
          link
          fedilink
          17
          edit-2
          3 months ago

          Clone.

          Repeat.

          Also, cellebrite.

          Edit: if people think forensics uses the actual device that would severely hinder any investigation.

          That would risk tampering, or destroying evidence.

          Copies are made.

          Technology exists.

          • @TrickDacy
            link
            43 months ago

            And the cloning can happen thousands of times in one second?

            • @stardom8048
              link
              English
              83 months ago

              According to reporting, they have actually done this before.

              Most of the discussion I’ve read about this is along the lines of: clone the drive on the phone and then brute force the clones (circumventing the lockout issue: if you get locked out just keep trying on a new clone).

              In a relatively famous case, the FBI cracked the password on the San Bernardino shooter’s phone, but did not explain how they did it: https://www.vox.com/2016/3/29/11325134/apple-iphone-fbi-san-bernardino-case-ends

              Here is a company selling a brute force module for iPhones, although they don’t explain how they get around the lockout issue: https://belkasoft.com/unlocking-ios-devices-with-brute-force

              Here is another article about a company that claims to be able to brute force iPhone passcodes: https://www.vice.com/en/article/how-to-brute-force-iphones-graykey/

              • @disguy_ovahea
                link
                4
                edit-2
                3 months ago

                The FBI didn’t crack it. It was done by Cellebrite. I worked for Apple during the San Bernardino case. The suspect had an iPhone 5c, a model that did not have a Secure Enclave, and was vulnerable to brute force hacking through the Lightning Port. The Secure Enclave was released with the iPhone 5s, along with Touch ID, preventing peripheral access through the Lightning Port after the iPhone has been restarted.