Cellebrite Now Able to Bypass Apple's Secure Enclave

Cellebrite Now Able to Bypass Apple's Secure Enclave

February 22, 2017 20:08 EST • Alexandre Vallières-Lagacé • 1 minute read

This is not a good news folks. Cellebrite can now do data extraction of the iPhone 4S, 5, 5C, 5s, 6 and 6 Plus. This means that the company behind the hack that allowed the FBI to peer into the San Bernardino bomber’s iPhone 5c can now do the same thing on devices that are known to have a much tighter security. People now wonder how they managed to do it.

Did they bypass the secure enclave? They probably are not able to force it but perhaps they did find a way to go around it. This is bad news, as we know, that Cellebrite might be great at finding hacks on iPhones, but they are not that great at securing their data. This information comes from Shahar Tal, Director of Forensics Research at Cellebrite.

That 12-digit pass code seems more and more tempting in order to get that device of yours secure…

reddit appstore rss jsonfeed twitter youtube macstore podcast Amazon cloudapp github-circled itunes pinterest mail heart search folder link website block plus-circled minus-circled thumbs-up paper-plane telegram-font-icon flipboard twitter-1 facebook github-circled-1 rss-1 menu gplus angle-double-left angle-double-right compass youtube-play instagram apple share newspaper reddit-alien telegram flipboard2 chevron-down