Hey all, wondering if anyone knows of any commercialized hardware
(e.g. developed into a product, not just a research paper) that
conducts attacks on powered-on, Full Disk Encrypted Android/iPhone
phones that _isn't_ PIN guessing?
So a powered-off FDE-ed iPhone or Android can be attacked by brute
On list
-- Forwarded message --
From: shawn wilson ag4ve...@gmail.com
Date: Mar 2, 2014 11:37 AM
Subject: Re: [cryptography] Commercialized Attack Hardware on SmartPhones
To: Tom Ritter t...@ritter.vg
Cc:
How about a dictionary and rules. Even if you choose an alphanumeric
strong
On 3/2/2014 10:33 AM, Tom Ritter wrote:
Hey all, wondering if anyone knows of any commercialized hardware
(e.g. developed into a product, not just a research paper) that
conducts attacks on powered-on, Full Disk Encrypted Android/iPhone
phones that _isn't_ PIN guessing?
So a powered-off FDE-ed
-- Forwarded message --
From: shawn wilson
How about a dictionary and rules. Even if you choose an alphanumeric
strong pass, you're kinda limited to the phone's keyboard - you're not
going to want to switch case or between letters and special too often.
Also, IIRC Android limits
On Mar 2, 2014 11:47 AM, Kevin kevinsisco61...@gmail.com wrote:
Tom:
Pherhaps I am in the dark about this, but I'm sure attacking android is
quite simple as mobile security is farely new. I have to wonder why you
are asking?
If it's simple, surely there are product descriptions, manuals,
Hi Tom,
Have you seen the cellebrite gear and their forensics tools?
My understanding is that their UFED gear attempts to exploit various
bugs in phones.
https://wikileaks.org/spyfiles/list/company-name/cellebrite.html
Here is one of their people talking about exploiting 0day bugs to gain
Hi Tom,
On 3/2/14, Tom Ritter t...@ritter.vg wrote:
On Mar 2, 2014 11:47 AM, Kevin kevinsisco61...@gmail.com wrote:
Tom:
Pherhaps I am in the dark about this, but I'm sure attacking android is
quite simple as mobile security is farely new. I have to wonder why you
are asking?
If it's