Apple Can Extract Texts, Photos, Contacts From Locked iPhones 202
Trailrunner7 (1100399) writes "If law enforcement gets hold of your locked iPhone and has some interest in its contents, Apple can pull all kinds of content from the device, including texts, contacts, photos and videos, call history and audio recordings. The company said in a new document that provides guidance for law enforcement agencies on the kinds of information Apple can provide and what methods can be used to obtain it that if served with a search warrant, officials will help law enforcement agents extract specific application-specific data from a locked iOS device. However, that data appears to be limited to information related to Apple apps, such as iMessage, the contacts and the camera. Email contents and calendar data can't be extracted, the company said in the guidelines."
So... cloud access? (Score:5, Insightful)
Once again, Apple iOS security is a sham (Score:1, Insightful)
If you want real, audited & certified security, get a blackberry.
Based on sales for the last few years, it looks like the market just doesn't care about security. As people put more & more of their life on their phone, you might think people would care.
Sad.
Another "threat post" blog entry. (Score:5, Insightful)
How much is threat post paying timothy to drive up their traffic with these half ass stories?
The summary fails to mention that the phone must be in their possession and the both the phone and the search warrant must be delivered to Apple's headquarters which is the only place Apple will perform the extraction.
If anything I applaud Apple for both publicly disclosing their policy for dealing with law enforcement and requiring a search warrant with more detail than "suspect's phone". They require the model number, phone number, serial of IEMI number and FCC ID number.
Re:News? (Score:4, Insightful)
The page states that they can only access information which is not encrypted, and is "active", whatever that means. Reading between the lines, it seems they can get at information that's currently in RAM.
Re:So... cloud access? (Score:5, Insightful)
So what exactly constitutes a "user generated active file"? Some kind of temp file kept open as long as an app is "open"? And what does "open" mean, really?
Look at the source code and see. Oh, right. Never mind, it's proprietary and thus 4200% fucked.
Add this question to your list: How do you even trust them to be telling the truth with national security gag letters now standard?
Re:Pro Tip: (Score:4, Insightful)
Got Root?
If the answer was ever anything other than "Yes" then you don't own shit.
Re:So... cloud access? (Score:4, Insightful)
It would do me as much good as it did 99.99% of OpenSSL users.
Actually 100% of OpenSSL users, for several years.