Sunday, March 6, 2016

Links about Apple Vs FBI John MCAfee perspective

http://www.worldstarhiphop.com/videos/video.php?v=wshhuK0j0ZBPYwg03t6l
John McAfee Reveals To FBI, On National TV, How To Crack The iPhone!
http://www.worldstarhiphop.com/videos/video.php?v=wshh6UTdxZi5P1z3wRUp
John McAfee Faces Off With Former FBI Agent Steve Rogers On iPhone Backdoor!
http://www.worldstarhiphop.com/videos/video.php?v=wshhd9NRI2B9ajz46c8i
Cybersecurity Expert "John McAfee" Blasts The FBI For Order Of Apple Encryption & Offers To Decrypt The iPhone So Apple Doesn’t Have To!

3 comments:

  1. The funny thing about the iPhone is that the Kernal that runs the phone will accept a serial connection via the Lightning phone on the phone, and this kernel runs as root, and when the phone is first turned on or is forced into DPU mode then the kenal can be given commands from outside the phone.

    It also allows a trojan to be implanted only the phone, or for a number of different mischevious programs to be loaded that facilitate hacking, or forensic analysis.

    The only security in place if that the phone seeks a certificate from the serial connection in order to unlock the kernel and allow it to take commands. The certificate it seeks in the "certificate" of a peripheral like a VGA or Ethernet adapter, and that can be obtained by sniffing any lightning peripheral to snag the manufacturers certificate and then having a Cellbrite or even a Pi pretend that it has the certificate, and the kernel kick on and starts accepting command. This same serial connection is also available to the Qualcomm cellular modem chip, and it appears that the cell phone carrier is capable of doing this over the air.

    No password, and no pass code is required, merely the spoofing of a device ID and the operating system opens up and command can be run from the CLI.

    If somebody in class will loan me they passcode locked iPhone for a few minutes ;-) I promise, no hacking, just understanding how the certification protocol is handled, and knowing how to pass the port the binary certificate is seeks, and then knowing that you have full root access at this prompt.

    I am sure that someone will be willing to let me borrow their iPhone for a few minutes. Of course nobody needs to be paranoid, it not like my task for the week is to hack into your iPhone and scarf up all your private photographs or anything.

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. John McAfee makes some good points on how easy it may be to hack into the iPhone. He has been in this business for a long time therefore I respect his opinion.

    ReplyDelete