iPhone 3Gs Encryption Cracked In Two Minutes 179
An anonymous reader writes "In a Wired news article, iPhone Forensics expert Jonathan Zdziarski explains how the much-touted hardware encryption of the iPhone 3Gs is but a farce, and demonstrates how both the passcode and backup encryption can be bypassed in about two minutes. Zdziarski also goes on to say that all data on the iPhone — including deleted data — is automatically decrypted by the iPhone when it's copied, allowing hackers and law enforcement agencies alike access the device's raw disk as if no encryption were present. A second demonstration features the recovery of the iPhone's entire disk while the device is still passcode-locked. According to a similar article in Ars Technica, Zdziarski describes the iPhone's hardware encryption by saying it's 'like putting privacy glass on half your shower door.' With the iPhone being sold into 20% of Fortune-100s and into the military, just how worried should we be with such shoddy security?"
The same F500 and military that use Windows? (Score:5, Informative)
Until the Fortune 500 and the military stop using Microsoft products, I won't lose a blink of sleep over them using Apple products. This guy had to have physical access to the iPhone to crack it, and even then the iPhone did not start sending its data out over the Internet along with a virus payload that formed a massive botnet that crippled Internet bandwidth.
My understanding is that the encryption in the 3GS is not meant to prevent a user with physical access to the device from accessing the data. It's to make Remote Wipe instant instead of taking 1 hour per gigabyte because the Remote Wipe only has to destroy the decryption keys, not every bit of data on the disk. When you Remote Wipe an iPhone 3G it takes 1 hour per gigabyte to destroy the data. With a 3GS, it takes a few seconds.
In this case, the hacker not only had the iPhone in his physical possession, but it was not Remote Wiped, so he also had the keys in his possession. How is it at all surprising that he was able to get in?
Security Professionals (Score:1, Informative)
Re:interesting (Score:5, Informative)
Re:On The Bright Side... (Score:5, Informative)
Re:interesting (Score:3, Informative)
You are assuming that the attacker does not use his own software for extracting and decrypting the data?
That assumption is usually one of the first and most obvious traps people fall into when they try to invent a new protection method.
But perhaps the assumption will hold in this particular case. I don't know if it is possible to extract the encrypted data from an iPhone and decrypt them elsewhere.
Re:interesting (Score:3, Informative)
That's how my work Blackberry is configured - if I enter my PIN wrong too many times, it self wipes. All my data is gone. Until I either plug it in to my workstation at work, and it restores form the backup, or I call in and get a new activation pin assigned and do a wireless sync. It's a bit of a pain in the butt when it happens, but seems like a reasonable trade off. Of course the BB has a good keyboard, so i don't mistype often :)
That being said, I do lust after an Iphone for personal use, but I would not at this point recommend we use them for corporate work, too much risk. My personal data is less valuable, as I don't carry around sensitive emails.
Min
Reader Fail (Score:3, Informative)
Re:Why can't the hacker get in? (Score:5, Informative)
Yes. But the BlackBerry doesn't store the encryption key in-the-clear like the iPhone 3G S does, and you can't run arbitrary code on a BlackBerry just by plugging it in to a PC.
In fact, it does. BlackBerries even have an option to not encrypt the address book so you can have names appear on caller ID while the device is locked.
No; the BlackBerry (or even the iPhone!) would be configured to wipe the device after a few invalid password attempts. My (corporate managed) BlackBerry wipes the device after 10 invalid password attempts, and my password is longer than 4 characters (and includes non-digits.)
Re:Why can't the hacker get in? (Score:3, Informative)
Commenter Fail (Score:2, Informative)
http://www.apple.com/iphone/business/ [apple.com]
It's odd that Apple would get a pass on not properly securing their CONSUMER phone that is also marketed as "the best phone for business."