A report reveals the details of unlocking an iPhone in the San Bernardino case investigation.


Nearly five years after his fall, The Washington Post has highlighted how the FBI managed to unlock the iPhone of the terrorist involved in the 2015 San Bernardino shooting, according to TheNextWeb.

The FBI initially sought Apple’s help in gaining access to the locked iPhone device, hoping to uncover information to aid in the investigation.While Apple provided some assistance, it did not go as far as creating a backdoor that would break the iOS encryption and cancel it. Lock the phone, as this could set a dangerous precedent for how law enforcement deals with such systems, and undermine the company’s security measures for its products.

Fortunately for the FBI, a small Australian company called Azimuth Security came up with a solution.The challenge was that the agency only had a certain number of opportunities to guess the phone’s passcode; After reaching the limit of failed passcode entry attempts, the device automatically wipes its data.

Basically Azimuth found a vulnerability in a piece of software Mozilla wrote, to get into the system, after that, he spliced ​​two other exploits together to take over the phone processor and run their own software on it.

At this point, Azimuth employees created a portion of the program to test every possible combination of passcodes without causing the phone to wipe its private data and was able to unlock the device.

However, this story did not reveal anything useful to the FBI in its investigations, and the whole thing cost the agency $ 900,000 in fees.

The 2016 news that the FBI had unlocked the iPhone sparked controversy because the agency did not disclose how it managed the feat without Apple’s help.


Please enter your comment!
Please enter your name here