Skip to main content

FBI pushing Apple for iPhone backdoor is risky, warn experts

In its battle with Apple over an extremist's iPhone, the FBI says neither the company nor anyone else has anything to fear. Although they want to compel assistance from Apple to unlock a phone used by San Bernardino mass shooter Syed Farook, officials say the techniques they propose are limited in scope and pose no risk to the privacy of other iPhone users.
Security experts say it's not so simple.

"It's a very dangerous proposition to claim that this capability could not be re-used," said Will Ackerly, chief technology officer at Virtru, a computer security firm he co-founded after working 8 years at the National Security Agency.
Federal prosecutors have asked a court to force Apple to produce special software that would help the FBI guess the passcode to an iPhone found in Farook's car. Federal officials say Apple will be free to destroy that software once the iPhone is open to investigators.
Apple argues it's unrealistic to think that governments, both in the US and overseas, won't ask to use the same program again in other cases. Ackerly and other experts echoed that concern. And on technical grounds, experts say, it may simply be impossible to keep the program from falling into the wrong hands.
True, some experts say Apple CEO Tim Cook is exaggerating when he says the government wants the company to create a "backdoor" into otherwise secure information held on iPhones. It might be closer to say the government wants to require Apple to help pick the lock to the front door. Even that approach, however, could still pose broader dangers.

Essentially, the FBI wants Apple to write a program that disables some iPhone security features so that federal computer experts could guess the phone's passcode by "brute force." Unlocking the phone with the passcode automatically decodes encrypted files. In particular, the FBI wants to disable a "self-destruct" mechanism that could render the phone unreadable after 10 bad guesses, as well as an enforced delay of up to an hour between incorrect passcode attempts.

US officials say their precautions would prevent anyone else — governments and criminal hackers included — from re-using that bypass software on other phones.
First, the government says Apple can design the program to work only when it recognizes Farook's iPhone, by checking the unique identifying code assigned to each device Apple makes. The iPhone won't respond if the program doesn't contain a cryptographic signature that verifies the software was created by Apple, the government said in its court filing.
Authorities say the program can be loaded onto the iPhone's temporary memory, so it will disappear once the iPhone is turned off. As an additional precaution, the government says Apple can design the program to let investigators try different passcodes by submitting them electronically, so that Apple can keep physical control over the iPhone while the special program is deployed.

"Compliance with the order presents no danger to any other phone," prosecutors said Friday in a court document signed by Assistant US Attorney Tracy Wilkinson.

Those measures should prevent anyone from getting their hands on the special software or re-using it on another phone, agreed Chris Eng, vice president of research at Veracode, a computer security firm. "From a technical perspective, I believe what's being described is completely possible."

Eng said he'd be more concerned if the government was seeking a true "backdoor" — a change in Apple's encryption algorithm that would let others break the code. That's not what the FBI is pursuing in this case, he said.

But other experts warned of technical risks in the government's plan. They said it would be difficult, but not impossible, to reverse-engineer the Apple program so it could work with other phones.

Software is easy to copy, despite the government's reassurances, said Bruce Schneier, a security expert and chief technology officer for Resilient Systems. "That's the nature of software."

The program wouldn't work on another iPhone unless a hacker modified it to recognize that device, and that would require forging Apple's digital signature, said Steve Bellovin, a computer science and security expert at Columbia University. But he said it's not beyond the realm of possibility that sophisticated hackers or a foreign government could steal Apple's signature code.

Though Apple is known for guarding its secrets closely, a senior executive said recent history shows that no companies are immune to hacking — either by outsiders or an employee who's been bribed to steal secrets. The executive, who spoke on condition of anonymity, also asserted that an outsider wouldn't need Apple's digital signature to modify the program so it works with another phone.
Any risk that the software could be stolen or modified will increase because other law enforcement agencies are likely to ask Apple to re-use that tool in the future, Apple contends. "Law enforcement agents around the country have already said they have hundreds of iPhones they want Apple to unlock if the FBI wins this case," the company said in a statement Monday.

Using the software even once could give authorities or outsiders new clues to how Apple's security features work, potentially exposing vulnerabilities that could be exploited in the future, Ackerly said. If Apple allows federal investigators to submit passwords through a remote connection, he added, that could open the phone to intrusion — including efforts to copy the program.

The government has promised it won't try to copy Apple's software, of course, and doing so would risk a judge's ire or even legal penalties.
Computer forensics expert Jonathan Zdziarski raised another possibility: If authorities find anything on the iPhone that they use in court — for example, to identify and prosecute any accomplices who aided the San Bernardino shooters — then Apple could be required to explain its software in court. A judge might also permit defense attorneys and their experts to study the program.
There's a strong likelihood "this tool won't be used once, but many times," Zdziarski said in an email, adding that each time could expose the software to copying or misuse.

Popular posts from this blog

Explained: Camera Improvements in the New HTC 10

With the HTC 10, the Taiwanese company is promising to undo the past wrongs in the cameras of its previous flagship phones. The camera has long a weak point in HTC devices. At first, HTC sacrificed image resolution in the M8 and made the size of individual pixels larger to capture more light (what HTC called Ultrapixel). But the resulting 4 megapixel images were often fuzzy, especially when cropped or enlarged. To fix the issue, in its next flagship - the M9 - HTC went with smaller individual pixels in a 20-megapixel camera last year, but it still underperformed in extreme situations, such as indoors and close-ups. In the HTC 10, the company attempts to strike a balance with larger individual pixels (1.55µm), but not as large as before and a 12 megapixel sensor in its camera coupled with a ƒ/1.8 lens. HTC accepts that in the imaging performance in the M9 was not up to the kind of spec of what they really like to see in a flagship. HTC is giving a slight boost to the selfi...

Freedom 251: 30,000 Units Sold, Components for Up to 2.5 Million Will Be Imported

Ringing Bells, the makers of the Rs. 251 smartphone - the Freedom 251 - confirmed to Gadgets 360 on Tuesday that it has still only accepted payments for 30,000 units of the phone. It also added that the components for these phones will be imported, and only assembled in India, not made here. Ringing Bells stopped accepting orders on February 19, and claims to have received over 70 million registrations. The company President and Director both repeatedly stated that the price of the phone would be made possible through economies of scale, and making the phone in India to cut out import costs. Economies of scale? However, in a discussion with Gadgets 360 the company revealed that it had only sold 30,000 units of the phone on day one. The company has now confirmed that it has not sent out the payment emails to anyone else who registered - "we were working out details of cash on delivery, which we are announcing now, so we will be sending emails to the first 2.5...

10 Smartphones with Features that You Won't Find in Any Other Phone

Here’s a list of phones which are first-of-their-kind. From feature phones to smartphones, flat screen to curved, fragile to shatterproof, mobile phones have evolved over the years. Although many industry analysts would like to call the current level of innovation reaching a stagnation point, there still are some manufacturers which have been able to surprise consumers by truly packing something different in their smartphones. We have compiled a list of phones which offer first-of-its-kind features, and they are not merely concepts. 1. Motorola X force - Shatterproof display Display today is the most vulnerable yet the most neglected element in modern smartphones. But Motorola finally paid heed to the fragile screen with the launch of the the Motorola X Force – the world’s first smartphone with a shatterproof display. The phone uses the Moto ShatterShield display technology, which is said to be an integrated system consisting of five layers designed from material...