{"id":41911,"date":"2020-01-21T04:10:25","date_gmt":"2020-01-21T09:10:25","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=41911"},"modified":"2020-01-21T04:10:25","modified_gmt":"2020-01-21T09:10:25","slug":"lawfare-apple-vs-fbi-pensacola-isnt-san-bernardino","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=41911","title":{"rendered":"Lawfare: Apple vs FBI: Pensacola Isn\u2019t San Bernardino"},"content":{"rendered":"<p>Lawfare: <a href=\"https:\/\/www.lawfareblog.com\/apple-vs-fbi-pensacola-isnt-san-bernardino\">Apple vs FBI: Pensacola Isn\u2019t San Bernardino<\/a> by Nicholas Weaver:<br \/>\n<!--more--><\/p>\n<blockquote><p>But there\u2019s an important difference between San Bernardino and Pensacola. After the 2015 attack, Apple was in a position to help the FBI\u2014it just refused to. (The bureau was eventually able to unlock the phone without the company\u2019s help.) This time, though, it is technically impossible for Apple to assist.<\/p>\n<p>First, some background. The iPhone, even an older phone like the iPhone 5, has impressive password-based security. Within the central processing unit (CPU) itself is a hardware encryption engine, designed to quickly enable encrypting and decrypting memory. This encryption engine can use multiple keys, one of which is particularly special.<\/p>\n<p>This special \u201cdevice key\u201d is a random key generated by the phone during its final assembly: The phone itself writes it into its CPU. Once written, even the phone itself can\u2019t see this key. Instead, the phone tells the hardware encryption engine to use the device key when the need arises. Newer phones do all this in the \u201csecure enclave,\u201d a separate processor within the main chip, but the process is effectively the same whichever model you\u2019re using.<\/p>\n<p>The device key is used when you go to unlock your phone. When you put your passcode into the phone, the CPU combines your passcode with the device key by repeatedly encrypting your passcode. After roughly a tenth of a second, the resulting random-looking value is then used to decrypt the master user key, which protects all personal data on the phone. Of course, if you get the wrong passcode, the phone can\u2019t decrypt the master key and asks you to try again.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Lawfare: Apple vs FBI: Pensacola Isn\u2019t San Bernardino by Nicholas Weaver:<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[125],"tags":[],"class_list":["post-41911","post","type-post","status-publish","format-standard","hentry","category-digital-privacy"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/41911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=41911"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/41911\/revisions"}],"predecessor-version":[{"id":41912,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/41911\/revisions\/41912"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=41911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=41911"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=41911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}