[Cryptography] Hope Apple Fights This!
Thierry Moreau
thierry.moreau at connotech.com
Wed Feb 17 09:59:41 EST 2016
On 17/02/16 04:58 AM, Harlan Lieberman-Berg wrote:
> Aram Perez <aramperez at mac.com> writes:
>> [The court orders Apple to] disable the feature that wipes the data on
>> the phone after 10 incorrect tries at entering a password."
>
> The response, of course, is to make sure you design your systems such
> that you can't be put in this situation in the first place. The newer
> versions of Apple's phones, in fact, use a secure co-processor with
> secure flash for this exact purpose.
>
Reading the Court order (posted on another thread) paragraph 2, the
software functions (erase of user data upon password entry failures,
time throttling of password entry attempts) that need to be customized
for the forensic facilities are typically *not* implemented in a secure
co-processor (or at least not implemented in a secure co-processor
devoid of a flash re-programming capability).
Not that such an architecture is impossible: it is simply too
antagonistic to product development culture to come up with a product
where encrypted user data is irrevocably lost when an encryption key is
zeroized.
- Thierry
More information about the cryptography
mailing list