The FBI is testing a code-based way to get into the San Bernardino iPhone
The FBI is testing a possible method to help unlock a terrorist’s iPhone on a number of different devices and operating systems before it tries the actual phone in question, law enforcement officials said. The agency anticipates it will soon be able to test the approach on the iPhone used by one of the shooters in the San Bernardino (CA) attack, apparently.
The solution, which officials said was brought to them by an outside party over the weekend, is aimed at replicating what the government had tried to force the phone’s maker, Apple, to do — write code to dismantle a security feature on the iPhone 5C that automatically erases data on the phone after 10 incorrect attempts to guess the numeric passcode. The bureau is testing the approach first on other devices to try to catch any errors that might inadvertently erase the data that investigators are trying to recover. “Caution is the rule of the land,” one official said. One idea being passed around the security community was a technique that requires removing the phone’s chip and making thousands of copies of the encrypted data on it. Once the data is copied, the chip is put back on the phone and a specialist can attempt to guess the passcode. If he guesses incorrectly — he has 10 attempts before the chip’s data gets wiped — he replaces the data with one of the copies. But FBI officials said they were going in a different direction. “I’ve heard that [method] a lot,” FBI Director James Comey said. “It doesn’t work.”