this post was submitted on 03 Mar 2024
464 points (83.2% liked)
Memes
45643 readers
1153 users here now
Rules:
- Be civil and nice.
- Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The fbi contracted a third party to defeat the limit on passcode attempts so they could brute force the lock screen by having someone just sit there trying every possible code. My understanding is that it involved physical access to the device and the way that process is handled by the phone was reengineered shortly afterwards to prevent it from happening in the future.
That’s not a backdoor, that’s sawing the front door into pieces to avoid triggering the anti-tamper system on the hinges and lock.
If you want backdoor worries, look to the generations of apple chips with undocumented memory mapped io registers that were in development during that time period. But don’t think too hard about how arm chips are developed or why that got left in there or how. You may come to the undeniable conclusion that a natsec cutout is licensing slabs of arm feature silicon with backdoors built in.
This is not a defense of apple. Only a clarification that there wasn’t a backdoor found in the San bernidino phone, and that if you wanna be freaked out about back doors there’s better stuff to get crazy over.
Gotcha gotcha
Thanks for the clarification
if youre worried about backdoors and spying, its a good idea to start paying attention to the trade publications and training media made for reprehensible spooks.
they'll say shit that makes you throw up in your mouth but you'll never look at push notifications or sms the same way again.
Usually, they just copy the phone into a Virtual Machine and copy the machine millions of times to try every password.