
The FBI can crack iPhones without Apple’s help
The Chinese in half an hour of time and 60 dollars turn a 16-gigabyte iPhone 6 into a 128-gigabyte one. In the process, a service center employee retrieves flash memory, copies all data, including identification, and then loads it into a new 128-gigabyte module.
Information security experts are confident that with the same success, the FBI can take the terrorist's iPhone and download everything from it, and then hack it in much less time than it takes to fight Apple in the courts. The FBI either wants to gain legal access to all devices (not even the Back Door, but the Front Door ), or the whole lawsuit is aimed at gaining political points.

Information Security Researcher Jonathan Zdziarski, Law Enforcement Consultant, Bloomberg, brought as one of the opportunities to unlock the terrorist’s iPhone 5C kiosk in Shenzhen, where for $ 60 they increase the gadget’s memory to 128 gigabytes. Copying all the data to a new memory module using a computer, tweezers and screwdrivers would allow the FBI to enter the password into the device as many times as needed, without fear of data loss. The researcher adds that hacking a gadget usually requires less than 200 attempts.
This is just one of many. All systems have gaps, and they are found every month in Apple software, adds a former DARPA manager, head of Siege Technologies, a cybersecurity company. The FBI does not need to contact Apple, it is enough to hire contractors from among specialists in this field.
Some experts believe that the FBI needs to be asked for help. The National Security Agency is the most funded spy agency in the world, which has legions of hackers capable of cracking almost everything that is possible.
The FBI requires Apple to turn off auto-deletion of data after 10 incorrect password attempts, turn off time delays for passwords, and provide methods for entering passwords quickly using electronic means. But Apple says that such software for the iPhone does not exist. It will take from 2 to 4 weeks to create, debug and deploy such software; 6-10 Apple engineers will be required to do this.
The process will be long and complicated , and the creation of such an opportunity for special services will call into question the concern for privacy.Apple customers. Google, Facebook, Microsoft and Twitter have already announced support for Apple in court.
Interestingly, Apple itself hints the FBI in its document to contact other government agencies to hack a smartphone, and claims that the connection between the company and the terrorist’s iPhone is the same as between General Motors and the criminal’s car.
Information security experts are confident that with the same success, the FBI can take the terrorist's iPhone and download everything from it, and then hack it in much less time than it takes to fight Apple in the courts. The FBI either wants to gain legal access to all devices (not even the Back Door, but the Front Door ), or the whole lawsuit is aimed at gaining political points.

Information Security Researcher Jonathan Zdziarski, Law Enforcement Consultant, Bloomberg, brought as one of the opportunities to unlock the terrorist’s iPhone 5C kiosk in Shenzhen, where for $ 60 they increase the gadget’s memory to 128 gigabytes. Copying all the data to a new memory module using a computer, tweezers and screwdrivers would allow the FBI to enter the password into the device as many times as needed, without fear of data loss. The researcher adds that hacking a gadget usually requires less than 200 attempts.
This is just one of many. All systems have gaps, and they are found every month in Apple software, adds a former DARPA manager, head of Siege Technologies, a cybersecurity company. The FBI does not need to contact Apple, it is enough to hire contractors from among specialists in this field.
Some experts believe that the FBI needs to be asked for help. The National Security Agency is the most funded spy agency in the world, which has legions of hackers capable of cracking almost everything that is possible.
The FBI requires Apple to turn off auto-deletion of data after 10 incorrect password attempts, turn off time delays for passwords, and provide methods for entering passwords quickly using electronic means. But Apple says that such software for the iPhone does not exist. It will take from 2 to 4 weeks to create, debug and deploy such software; 6-10 Apple engineers will be required to do this.
The process will be long and complicated , and the creation of such an opportunity for special services will call into question the concern for privacy.Apple customers. Google, Facebook, Microsoft and Twitter have already announced support for Apple in court.
Interestingly, Apple itself hints the FBI in its document to contact other government agencies to hack a smartphone, and claims that the connection between the company and the terrorist’s iPhone is the same as between General Motors and the criminal’s car.