Quote:
Originally Posted by FlamingZword
A huge problem here.
If Apple can actually create this software, then others will know that it is possible to do.
I can see a bunch of cryptohackers getting together and creating their own version of this software and selling it in the dark net.
|
Well if all they are doing is brute force then hackers already are doing that I'm sure.
If it's not brute force then they have some special key that gives them access into the phone. Such a key is likely large enough to take hackers 100+ years to break into the phone if they brute force it. Probably easier to use social engineering and steal the key from apple's employees at that point. Still it's a relative longshot either way.