The core of the iPhone’s “auto-erase” security
At the core of the issue is the iPhone’s “auto-erase” security feature that, which enabled, wipes the phone’s content after 10 failed attempts at entering the phone’s password.
In an examination and analysis of the FBI’s complaint, the ACLU contends that the government agency’s argument is false and that an iPhone’s flash memory can be removed, permanently backed up, and infinitely restored in the attempt to recover locked data.
NSA whistleblower Edward Snowden weighed in on the matter, decrying in response to the FBI’s claims that Apple is the only entity with the technical means to aid in unlocking the device’s data that “respectfully, that’s bullsh**.”
The NSA has been noticeably silent on the matter. When Congressman Darrell Issa questioned FBI director James Comey about potential forensic solutions to the issue, Comey admitted that he was unaware of numerous processes that could potentially address the issue without Apple’s involvement.
And now the trial is on hold, as the government claims it is working with a third party that has a possible method for decrypting the iPhone.
Part 2 will cover the security of the Nissan Leaf
About the author
Mr. Braunstein serves as Chairman/CEO and Executive Director of Research at the Robert Frances Group (RFG). In addition to his corporate role, he helps his clients wrestle with a range of business, management, regulatory, and technology issues.
He has deep and broad experience in business strategy management, business process management, enterprise systems architecture, financing, mission-critical systems, project and portfolio management, procurement, risk management, sustainability, and vendor management. Cal also chaired a Business Operational Risk Council whose membership consisted of a number of top global financial institutions.