Apple Says FBI May Unlock Brooklyn iPhone Too

FBI

The San Bernardino case may have come to an end, but the dispute between the FBI and Apple is far from doing it. There is currently another pending case in which US law enforcement is asking the Cupertino company for help in accessing data from Jun Feng's iPhone 5s, a Brooklyn meth dealer it says you don't remember your phone password. Feng has already been convicted, but the FBI wants to see if his iPhone has information that could lead them to other traffickers.

The FBI says Apple is the only company that can help them access the iPhone 5s from Feng because the method used to access the San Bernardino sniper's iPhone 5c data does not work on newer devices. According to the FBI, the hack that they used only works in that particular case (and I go and believe it…). Without a doubt, the forces of the law want to continue pressing to be able to enter our telephones without major problems.

According to Apple, the FBI no longer needs your help

On the other hand, Apple says that the FBI has what it takes to breach the security of the phone without their help and that they just want to force them to do the job for create a precedent that they can use for other cases. The lawyer, who has wanted to remain anonymous, says that the Brooklyn iPhone uses an old version of iOS that the FBI has already managed to hack in the San Bernardino investigations, so he believes that it should still be easier to access its data. The newer the version, the more difficult it is to break.

I think the FBI was wrong to accept help from Cellebrite. It has been shown that his intention is to create a precedent and by asking a third company for help to access an iPhone he has created a precedent that Apple will be able to use in future allegations, as it has done in the case of the Brooklyn dealer. We'll see what happens in the next episode of the soap opera Apple vs. FBI.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   pacoflo said

    That they cut off his finger, right? If it's a 5s

    1.    David said

      Touch ID does not work if the finger does not have the normal electrical current that it has when it is "alive", attached to the body
      That is, the scanner is not based solely on the fingerprint itself, but also on the cellular electrical charge

        1.    Paul Aparicio said

          Hello Javi. David is partly right. You do need a live finger. If you notice, the one in that video he puts it on top of his own finger because what he needs is a pulse, not electricity. That pulse or blood flow is noticeable even if you have plastelin.

          A greeting.

  2.   David said

    Hi, Pablo
    It is based on the different electric charge of valleys and ridges of the footprint, which in turn comes from the pulse; but it's not the pulse itself, it's the difference in that load
    All the best