<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Feds break through seized iPhone, stand down in legal battle with Apple &#124; Ars Technica</title>
	<atom:link href="http://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 21 Apr 2026 08:24:24 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1488597</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 27 Apr 2016 04:56:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1488597</guid>
		<description><![CDATA[Devlin Barrett / Wall Street Journal: 	
Sources: FBI plans to keep iPhone-hacking method secret, will discourage White House from beginning internal review of whether it should be disclosed to Apple  —  FBI Plans to Keep Apple iPhone-Hacking Method Secret  —  Move would likely keep Apple in the dark about security weakness

FBI Plans to Keep Apple iPhone-Hacking Method Secret
Move would likely keep Apple in the dark about security weakness 
http://www.wsj.com/article_email/fbi-plans-to-keep-apple-iphone-hacking-method-secret-sources-say-1461694735-lMyQjAxMTE2MTI5NjcyMTYyWj

Joseph Menn / Reuters: 	
Apple says it received its first FBI tip via Vulnerability Equities Process on April 14; vulnerability already fixed on iOS9 and El Capitan  —  Apple says FBI gave it first vulnerability tip on April 14  —  The FBI informed Apple Inc of a vulnerability in its iPhone and Mac software on April 14 … 

Apple says FBI gave it first vulnerability tip on April 14
http://www.reuters.com/article/us-apple-encryption-fbi-disclosure-idUSKCN0XO00T]]></description>
		<content:encoded><![CDATA[<p>Devlin Barrett / Wall Street Journal:<br />
Sources: FBI plans to keep iPhone-hacking method secret, will discourage White House from beginning internal review of whether it should be disclosed to Apple  —  FBI Plans to Keep Apple iPhone-Hacking Method Secret  —  Move would likely keep Apple in the dark about security weakness</p>
<p>FBI Plans to Keep Apple iPhone-Hacking Method Secret<br />
Move would likely keep Apple in the dark about security weakness<br />
<a href="http://www.wsj.com/article_email/fbi-plans-to-keep-apple-iphone-hacking-method-secret-sources-say-1461694735-lMyQjAxMTE2MTI5NjcyMTYyWj" rel="nofollow">http://www.wsj.com/article_email/fbi-plans-to-keep-apple-iphone-hacking-method-secret-sources-say-1461694735-lMyQjAxMTE2MTI5NjcyMTYyWj</a></p>
<p>Joseph Menn / Reuters:<br />
Apple says it received its first FBI tip via Vulnerability Equities Process on April 14; vulnerability already fixed on iOS9 and El Capitan  —  Apple says FBI gave it first vulnerability tip on April 14  —  The FBI informed Apple Inc of a vulnerability in its iPhone and Mac software on April 14 … </p>
<p>Apple says FBI gave it first vulnerability tip on April 14<br />
<a href="http://www.reuters.com/article/us-apple-encryption-fbi-disclosure-idUSKCN0XO00T" rel="nofollow">http://www.reuters.com/article/us-apple-encryption-fbi-disclosure-idUSKCN0XO00T</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1488556</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 26 Apr 2016 11:18:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1488556</guid>
		<description><![CDATA[FBI ends second iPhone fight after someone, um, &#039;remembers&#039; the PIN
Feds backing away from effort to set legal precedent
http://www.theregister.co.uk/2016/04/25/fbi_drops_second_iphone_case/

For the second time, the FBI has dropped a legal attempt to force Apple to unlock an iPhone at the last minute.

Earlier this month, the FBI backed away from the high-profile San Bernardino case the day before it was due in court by claiming it had paid a third party (apparently $1.2m) to unlock the phone.]]></description>
		<content:encoded><![CDATA[<p>FBI ends second iPhone fight after someone, um, &#8216;remembers&#8217; the PIN<br />
Feds backing away from effort to set legal precedent<br />
<a href="http://www.theregister.co.uk/2016/04/25/fbi_drops_second_iphone_case/" rel="nofollow">http://www.theregister.co.uk/2016/04/25/fbi_drops_second_iphone_case/</a></p>
<p>For the second time, the FBI has dropped a legal attempt to force Apple to unlock an iPhone at the last minute.</p>
<p>Earlier this month, the FBI backed away from the high-profile San Bernardino case the day before it was due in court by claiming it had paid a third party (apparently $1.2m) to unlock the phone.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1487876</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 Apr 2016 09:15:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1487876</guid>
		<description><![CDATA[FBI paid at least $1.3M for zero-day to get into San Bernardino iPhone
FBI Director James Comey: &quot;But it was, in my view, worth it.&quot;
http://arstechnica.com/tech-policy/2016/04/fbi-paid-at-least-1-3m-for-zero-day-to-get-into-san-bernardino-iphone/

FBI Director James Comey suggested to a conference in London that his agency paid more than $1.3 million to gray-hat hackers who were able to unlock the iPhone 5C that was used by Syed Farook Rizwan, the dead terrorist who masterminded the attack in San Bernardino, California, in December 2015.

According to Reuters, Comey was asked Thursday how much the FBI paid for the technique that eventually allowed investigators to access the locked phone.

&quot;A lot. More than I will make in the remainder of this job, which is seven years and four months for sure,&quot; Comey said. &quot;But it was, in my view, worth it.&quot;

FBI paid more than $1.3 million to break into San Bernardino iPhone
http://www.reuters.com/article/us-apple-encryption-fbi-idUSKCN0XI2IB?feedType=RSS&amp;feedName=technologyNews&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+reuters%2FtechnologyNews+%28Reuters+Technology+News%29

Federal Bureau of Investigation Director James Comey said on Thursday the agency paid more to get into the iPhone of one of the San Bernardino shooters than he will make in the remaining seven years and four months he has in his job. 

According to figures from the FBI and the U.S. Office of Management and Budget, Comey&#039;s annual salary as of January 2015 was $183,300. Without a raise or bonus, Comey will make $1.34 million over the remainder of his job.

That suggests the FBI paid the largest ever publicized fee for a hacking job, easily surpassing the $1 million paid by U.S. information security company Zerodium to break into phones.]]></description>
		<content:encoded><![CDATA[<p>FBI paid at least $1.3M for zero-day to get into San Bernardino iPhone<br />
FBI Director James Comey: &#8220;But it was, in my view, worth it.&#8221;<br />
<a href="http://arstechnica.com/tech-policy/2016/04/fbi-paid-at-least-1-3m-for-zero-day-to-get-into-san-bernardino-iphone/" rel="nofollow">http://arstechnica.com/tech-policy/2016/04/fbi-paid-at-least-1-3m-for-zero-day-to-get-into-san-bernardino-iphone/</a></p>
<p>FBI Director James Comey suggested to a conference in London that his agency paid more than $1.3 million to gray-hat hackers who were able to unlock the iPhone 5C that was used by Syed Farook Rizwan, the dead terrorist who masterminded the attack in San Bernardino, California, in December 2015.</p>
<p>According to Reuters, Comey was asked Thursday how much the FBI paid for the technique that eventually allowed investigators to access the locked phone.</p>
<p>&#8220;A lot. More than I will make in the remainder of this job, which is seven years and four months for sure,&#8221; Comey said. &#8220;But it was, in my view, worth it.&#8221;</p>
<p>FBI paid more than $1.3 million to break into San Bernardino iPhone<br />
<a href="http://www.reuters.com/article/us-apple-encryption-fbi-idUSKCN0XI2IB?feedType=RSS&#038;feedName=technologyNews&#038;utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+reuters%2FtechnologyNews+%28Reuters+Technology+News%29" rel="nofollow">http://www.reuters.com/article/us-apple-encryption-fbi-idUSKCN0XI2IB?feedType=RSS&#038;feedName=technologyNews&#038;utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+reuters%2FtechnologyNews+%28Reuters+Technology+News%29</a></p>
<p>Federal Bureau of Investigation Director James Comey said on Thursday the agency paid more to get into the iPhone of one of the San Bernardino shooters than he will make in the remaining seven years and four months he has in his job. </p>
<p>According to figures from the FBI and the U.S. Office of Management and Budget, Comey&#8217;s annual salary as of January 2015 was $183,300. Without a raise or bonus, Comey will make $1.34 million over the remainder of his job.</p>
<p>That suggests the FBI paid the largest ever publicized fee for a hacking job, easily surpassing the $1 million paid by U.S. information security company Zerodium to break into phones.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1487615</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 20 Apr 2016 20:48:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1487615</guid>
		<description><![CDATA[FBI can&#039;t unlock 13% of password-protected phones it seized, official says
http://www.usatoday.com/story/news/politics/2016/04/19/fbi-cant-unlock-13-password-protected-phones-seized-official-says/83224860/

The FBI cannot unlock 13% of the password-protected cellphones it has seized as evidence in the past six months, a top bureau official told a House panel Tuesday.

About 30% of the 3,000-plus phones that the FBI has seized since Oct. 1 require passwords to open


&quot;Clearly, that presents us with a challenge,&quot; Hess told members of the House Energy and Commerce Committee, which brought in law enforcement officials and tech experts to testify about the pros and cons of &quot;end-to-end&quot; encryption, which is designed so that only users can unlock it.

Congress is struggling to decide what legislation — if any — it should pass on encryption.

Law enforcement officials say that such a law is needed to keep terrorists and criminals from hiding plots and evidence from investigators armed with court orders. Silicon Valley has come out strongly against the bill, saying it will make Americans more vulnerable to cyber criminals and hackers.

Requests involving more than 500 encrypted devices flooded the FBI&#039;s Computer Analysis Response Team and the agency’s Regional Computer Forensic Laboratory programs during a four-month period beginning last October, FBI officials have said.]]></description>
		<content:encoded><![CDATA[<p>FBI can&#8217;t unlock 13% of password-protected phones it seized, official says<br />
<a href="http://www.usatoday.com/story/news/politics/2016/04/19/fbi-cant-unlock-13-password-protected-phones-seized-official-says/83224860/" rel="nofollow">http://www.usatoday.com/story/news/politics/2016/04/19/fbi-cant-unlock-13-password-protected-phones-seized-official-says/83224860/</a></p>
<p>The FBI cannot unlock 13% of the password-protected cellphones it has seized as evidence in the past six months, a top bureau official told a House panel Tuesday.</p>
<p>About 30% of the 3,000-plus phones that the FBI has seized since Oct. 1 require passwords to open</p>
<p>&#8220;Clearly, that presents us with a challenge,&#8221; Hess told members of the House Energy and Commerce Committee, which brought in law enforcement officials and tech experts to testify about the pros and cons of &#8220;end-to-end&#8221; encryption, which is designed so that only users can unlock it.</p>
<p>Congress is struggling to decide what legislation — if any — it should pass on encryption.</p>
<p>Law enforcement officials say that such a law is needed to keep terrorists and criminals from hiding plots and evidence from investigators armed with court orders. Silicon Valley has come out strongly against the bill, saying it will make Americans more vulnerable to cyber criminals and hackers.</p>
<p>Requests involving more than 500 encrypted devices flooded the FBI&#8217;s Computer Analysis Response Team and the agency’s Regional Computer Forensic Laboratory programs during a four-month period beginning last October, FBI officials have said.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1487119</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 18 Apr 2016 09:32:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1487119</guid>
		<description><![CDATA[The FBI Finds Nothing Interesting So Far on Syed Farook’s iPhone

In a development that’s resulted in more facepalming than surprise within the cryptography community, a source tells CBS News that the FBI has found “nothing significant” in the data of the now-cracked iPhone of San Bernardino shooter Syed Rizwan Farook. According to CBS, the FBI is still analyzing the phone, which was unlocked with the assistance of contract hackers after a six-week legal dispute with Apple over the company’s refusal to help bypass its own encryption. But iPhone forensics expert Jonathan Zdziarski is skeptical: “There’s no such thing as ‘an ongoing analysis’ this long, unless you’re playing Angry Birds on Farook’s phone,” he wrote on Twitter.

Source: http://www.wired.com/2016/04/security-week-tax-day-near-irs-hackable-ever/]]></description>
		<content:encoded><![CDATA[<p>The FBI Finds Nothing Interesting So Far on Syed Farook’s iPhone</p>
<p>In a development that’s resulted in more facepalming than surprise within the cryptography community, a source tells CBS News that the FBI has found “nothing significant” in the data of the now-cracked iPhone of San Bernardino shooter Syed Rizwan Farook. According to CBS, the FBI is still analyzing the phone, which was unlocked with the assistance of contract hackers after a six-week legal dispute with Apple over the company’s refusal to help bypass its own encryption. But iPhone forensics expert Jonathan Zdziarski is skeptical: “There’s no such thing as ‘an ongoing analysis’ this long, unless you’re playing Angry Birds on Farook’s phone,” he wrote on Twitter.</p>
<p>Source: <a href="http://www.wired.com/2016/04/security-week-tax-day-near-irs-hackable-ever/" rel="nofollow">http://www.wired.com/2016/04/security-week-tax-day-near-irs-hackable-ever/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1486385</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 13 Apr 2016 15:24:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1486385</guid>
		<description><![CDATA[Ellen Nakashima / Washington Post: 	  
Sources: FBI did not use Cellebrite to crack San Bernardino iPhone, paid hackers for undisclosed software flaw that was used to create hardware to crack PIN  —  FBI paid professional hackers one-time fee to crack San Bernardino iPhone  —  The FBI cracked a San Bernardino terrorist&#039;s phone … 

FBI paid professional hackers one-time fee to crack San Bernardino iPhone
https://www.washingtonpost.com/world/national-security/fbi-paid-professional-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-00de-11e6-9d36-33d198ea26c5_story.html

The FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.

The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone’s four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said.]]></description>
		<content:encoded><![CDATA[<p>Ellen Nakashima / Washington Post:<br />
Sources: FBI did not use Cellebrite to crack San Bernardino iPhone, paid hackers for undisclosed software flaw that was used to create hardware to crack PIN  —  FBI paid professional hackers one-time fee to crack San Bernardino iPhone  —  The FBI cracked a San Bernardino terrorist&#8217;s phone … </p>
<p>FBI paid professional hackers one-time fee to crack San Bernardino iPhone<br />
<a href="https://www.washingtonpost.com/world/national-security/fbi-paid-professional-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-00de-11e6-9d36-33d198ea26c5_story.html" rel="nofollow">https://www.washingtonpost.com/world/national-security/fbi-paid-professional-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-00de-11e6-9d36-33d198ea26c5_story.html</a></p>
<p>The FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.</p>
<p>The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone’s four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1486331</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 13 Apr 2016 11:21:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1486331</guid>
		<description><![CDATA[FBI paid hackers to crack San Bernardino gunman&#039;s iPhone
http://www.chicagotribune.com/news/nationworld/ct-apple-fbi-encryption-debate-20160412-story.html

The FBI cracked a San Bernardino terrorist&#039;s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.

The researchers, who typically keep a low profile, specialize in hunting for vulnerabilities in software and then in some cases selling them to the U.S. government. They were paid a one-time flat fee for the solution.]]></description>
		<content:encoded><![CDATA[<p>FBI paid hackers to crack San Bernardino gunman&#8217;s iPhone<br />
<a href="http://www.chicagotribune.com/news/nationworld/ct-apple-fbi-encryption-debate-20160412-story.html" rel="nofollow">http://www.chicagotribune.com/news/nationworld/ct-apple-fbi-encryption-debate-20160412-story.html</a></p>
<p>The FBI cracked a San Bernardino terrorist&#8217;s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.</p>
<p>The researchers, who typically keep a low profile, specialize in hunting for vulnerabilities in software and then in some cases selling them to the U.S. government. They were paid a one-time flat fee for the solution.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1486274</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 13 Apr 2016 04:47:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1486274</guid>
		<description><![CDATA[Ellen Nakashima / Washington Post: 	
Sources: FBI did not use Cellebrite to crack San Bernardino iPhone, paid hackers for undisclosed software flaw that was used to create hardware to crack PIN  —  FBI paid professional hackers one-time fee to crack San Bernardino iPhone  —  The FBI cracked a San Bernardino terrorist&#039;s phone … 

FBI paid professional hackers one-time fee to crack San Bernardino iPhone
https://www.washingtonpost.com/world/national-security/fbi-paid-professional-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-00de-11e6-9d36-33d198ea26c5_story.html

The FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.

The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone’s four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said.

Cracking the four-digit PIN, which the FBI had estimated would take 26 minutes, was not the hard part for the bureau. The challenge from the beginning was disabling a feature on the phone that wipes data stored on the device after 10 incorrect tries at guessing the code. A second feature also steadily increases the time allowed between attempts.

The U.S. government now has to weigh whether to disclose the flaws to Apple, a decision that probably will be made by a White House-led group.

Apple said last week that it would not sue the government to gain access to the solution.

Still, many security and privacy experts have been calling on the government to disclose the vulnerability data to Apple so that the firm can patch it.

The White House has established a process in which federal officials weigh whether to disclose any security vulnerabilities they find.

“When we discover these vulnerabilities, there’s a very strong bias towards disclosure,” White House cybersecurity coordinator Michael Daniel said in an October 2014 interview, speaking generally and not about the Apple case. “That’s for a good reason. If you had to pick the economy and the government that is most dependent on a digital infrastructure, that would be the United States.”]]></description>
		<content:encoded><![CDATA[<p>Ellen Nakashima / Washington Post:<br />
Sources: FBI did not use Cellebrite to crack San Bernardino iPhone, paid hackers for undisclosed software flaw that was used to create hardware to crack PIN  —  FBI paid professional hackers one-time fee to crack San Bernardino iPhone  —  The FBI cracked a San Bernardino terrorist&#8217;s phone … </p>
<p>FBI paid professional hackers one-time fee to crack San Bernardino iPhone<br />
<a href="https://www.washingtonpost.com/world/national-security/fbi-paid-professional-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-00de-11e6-9d36-33d198ea26c5_story.html" rel="nofollow">https://www.washingtonpost.com/world/national-security/fbi-paid-professional-hackers-one-time-fee-to-crack-san-bernardino-iphone/2016/04/12/5397814a-00de-11e6-9d36-33d198ea26c5_story.html</a></p>
<p>The FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.</p>
<p>The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone’s four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said.</p>
<p>Cracking the four-digit PIN, which the FBI had estimated would take 26 minutes, was not the hard part for the bureau. The challenge from the beginning was disabling a feature on the phone that wipes data stored on the device after 10 incorrect tries at guessing the code. A second feature also steadily increases the time allowed between attempts.</p>
<p>The U.S. government now has to weigh whether to disclose the flaws to Apple, a decision that probably will be made by a White House-led group.</p>
<p>Apple said last week that it would not sue the government to gain access to the solution.</p>
<p>Still, many security and privacy experts have been calling on the government to disclose the vulnerability data to Apple so that the firm can patch it.</p>
<p>The White House has established a process in which federal officials weigh whether to disclose any security vulnerabilities they find.</p>
<p>“When we discover these vulnerabilities, there’s a very strong bias towards disclosure,” White House cybersecurity coordinator Michael Daniel said in an October 2014 interview, speaking generally and not about the Apple case. “That’s for a good reason. If you had to pick the economy and the government that is most dependent on a digital infrastructure, that would be the United States.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1485122</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 08 Apr 2016 10:35:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1485122</guid>
		<description><![CDATA[Apple vs FBI: When privacy and safety collide
http://www.edn.com/electronics-blogs/from-the-edge-/4441781/Apple-vs-FBI–When-privacy-and-safety-collide?_mc=NL_EDN_EDT_EDN_weekly_20160407&amp;cid=NL_EDN_EDT_EDN_weekly_20160407&amp;elqTrackId=b7a16ea4a60047b3b00aaad051393c67&amp;elq=9d6dd7061f1a46d5a4535eb93af1da75&amp;elqaid=31714&amp;elqat=1&amp;elqCampaignId=27703

Once the two sides had a chance to move everything to their opposite corners of the ring, people I know (me included) began to line up behind one side or another in the fight between Apple and the FBI. Writing this blog may unleash the passions of many the same way in-depth discussions of religion or politics do. But, I just have to ask: Where do you weigh in on Apple’s refusal to unlock the phone?

It’s fait accompli – the data has been taken off the phone. But still the questions linger, and the debate should not be forgotten—and won’t be. I’ll try to summarize the competing positions.

While Apple has no sympathy for terrorists, once the FBI made the mistake of changing the Apple ID password on the phone, there was no path to obtaining the data without the creation of a backdoor.

While it would seem that Apple should, according to the FBI, be able to unlock the iPhone used in the San Bernardino terrorist attacks, and then not use it again, the reality is law enforcement nationally was lining up with iPhones in the hundreds that they wanted unlocked.]]></description>
		<content:encoded><![CDATA[<p>Apple vs FBI: When privacy and safety collide<br />
<a href="http://www.edn.com/electronics-blogs/from-the-edge-/4441781/Apple-vs-FBI–When-privacy-and-safety-collide?_mc=NL_EDN_EDT_EDN_weekly_20160407&#038;cid=NL_EDN_EDT_EDN_weekly_20160407&#038;elqTrackId=b7a16ea4a60047b3b00aaad051393c67&#038;elq=9d6dd7061f1a46d5a4535eb93af1da75&#038;elqaid=31714&#038;elqat=1&#038;elqCampaignId=27703" rel="nofollow">http://www.edn.com/electronics-blogs/from-the-edge-/4441781/Apple-vs-FBI–When-privacy-and-safety-collide?_mc=NL_EDN_EDT_EDN_weekly_20160407&#038;cid=NL_EDN_EDT_EDN_weekly_20160407&#038;elqTrackId=b7a16ea4a60047b3b00aaad051393c67&#038;elq=9d6dd7061f1a46d5a4535eb93af1da75&#038;elqaid=31714&#038;elqat=1&#038;elqCampaignId=27703</a></p>
<p>Once the two sides had a chance to move everything to their opposite corners of the ring, people I know (me included) began to line up behind one side or another in the fight between Apple and the FBI. Writing this blog may unleash the passions of many the same way in-depth discussions of religion or politics do. But, I just have to ask: Where do you weigh in on Apple’s refusal to unlock the phone?</p>
<p>It’s fait accompli – the data has been taken off the phone. But still the questions linger, and the debate should not be forgotten—and won’t be. I’ll try to summarize the competing positions.</p>
<p>While Apple has no sympathy for terrorists, once the FBI made the mistake of changing the Apple ID password on the phone, there was no path to obtaining the data without the creation of a backdoor.</p>
<p>While it would seem that Apple should, according to the FBI, be able to unlock the iPhone used in the San Bernardino terrorist attacks, and then not use it again, the reality is law enforcement nationally was lining up with iPhones in the hundreds that they wanted unlocked.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/03/29/feds-break-through-seized-iphone-stand-down-in-legal-battle-with-apple-ars-technica/comment-page-1/#comment-1485121</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 08 Apr 2016 10:34:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=40565#comment-1485121</guid>
		<description><![CDATA[CNNMoney: 	
FBI director James Comey says the 3rd-party tool the FBI bought and used to unlock San Bernardino shooter&#039;s iPhone does not work with iPhone 5s or later  —  FBI director: We bought ‘a tool’ to hack terrorist&#039;s iPhone  —  FBI Director James Comey said Wednesday that the government had purchased … 

FBI director: We bought &#039;a tool&#039; to hack terrorist&#039;s iPhone
http://money.cnn.com/2016/04/07/technology/fbi-iphone-hack-san-bernardino/

FBI Director James Comey said Wednesday that the government had purchased &quot;a tool&quot; from a private party in order to unlock the iPhone used by one of the San Bernardino shooters.

&quot;Litigation between the government and Apple over the San Bernardino phone has ended, because the government has purchased, from a private party, a way to get into that phone, 5C, running iOS 9,&quot; Comey said. 

The FBI director also said the purchased tool worked only on a &quot;narrow slice of phones&quot; that does not include the newest Apple models, or the 5S. 

&quot;We tell Apple, then they&#039;re going to fix it, then we&#039;re back where we started from,&quot; he said. &quot;We may end up there, we just haven&#039;t decided yet.&quot;]]></description>
		<content:encoded><![CDATA[<p>CNNMoney:<br />
FBI director James Comey says the 3rd-party tool the FBI bought and used to unlock San Bernardino shooter&#8217;s iPhone does not work with iPhone 5s or later  —  FBI director: We bought ‘a tool’ to hack terrorist&#8217;s iPhone  —  FBI Director James Comey said Wednesday that the government had purchased … </p>
<p>FBI director: We bought &#8216;a tool&#8217; to hack terrorist&#8217;s iPhone<br />
<a href="http://money.cnn.com/2016/04/07/technology/fbi-iphone-hack-san-bernardino/" rel="nofollow">http://money.cnn.com/2016/04/07/technology/fbi-iphone-hack-san-bernardino/</a></p>
<p>FBI Director James Comey said Wednesday that the government had purchased &#8220;a tool&#8221; from a private party in order to unlock the iPhone used by one of the San Bernardino shooters.</p>
<p>&#8220;Litigation between the government and Apple over the San Bernardino phone has ended, because the government has purchased, from a private party, a way to get into that phone, 5C, running iOS 9,&#8221; Comey said. </p>
<p>The FBI director also said the purchased tool worked only on a &#8220;narrow slice of phones&#8221; that does not include the newest Apple models, or the 5S. </p>
<p>&#8220;We tell Apple, then they&#8217;re going to fix it, then we&#8217;re back where we started from,&#8221; he said. &#8220;We may end up there, we just haven&#8217;t decided yet.&#8221;</p>
]]></content:encoded>
	</item>
</channel>
</rss>
