• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

Protect your iPhone from the clutches of the FBI by switching to longer passcodes

February 19th, 2016 Ali Raza Security 0 comments
Protect your iPhone from the clutches of the FBI by switching to longer passcodes
Share on FacebookShare on Twitter

Protect your iPhone from the clutches of the FBI by switching to longer passcodes

The on-going tussle between the FBI and Apple on the San Bernardino case has raised many concerns, most of which come from security experts. The FBI wants Apple to build a backdoor in one particular iPhone, but CEO Tim Cook is against it, saying it would compromise all iPhones. Users, though, can protect themselves better simply by switching to larger passcodes, as per The Intercept’s report.

The case of FBI versus Apple in the San Bernardino issue has attracted the attention of people from all over the world. The issue is the FBI requesting Apple to build a backdoor to help them break into the iPhone of one of the killers involved in the mass shooting spree of San Bernardino, which claimed 14 victims. Apple CEO Tim Cook, though, has rejected the FBI’s appeal to do so, saying that if he were to do it, then the backdoor would hand the FBI the ability to break into any iPhone they wish.

output_ZuGzn7


[fullsquaread][/fullsquaread]

No one knows exactly what methods of encryption are used by iPhones or likewise, what methods are used by the FBI to break into a mobile device. However, what is known is that after failing to guess the correct passcode 5 times, iPhone disables further attempts for one minute. This waiting time increases to 5 and then 15 minutes later, till 10 unsuccessful attempts are made.

After that, all the data on the iPhone is erased. This is what the FBI wants Apple to change on the device of the accused. They wish Apple to remove this waiting time as well as the number of unsuccessful attempts allowed on an iPhone. Tim Cook has come out against this openly for he believes that doing such a thing would mean that the backdoor could hypothetically be deployed on any iPhone device later. Many security professionals, as well as Google CEO Sunder Pichai, have come out in support for Tim Cook on his stand on the issue.

However, if one looks at it from the perspective of a casual iPhone user, a simple method is available to prevent the FBI from getting their way and gain access to your iPhone easily. The FBI, no doubt, will look to enforce some brute force algorithm to guess the correct passcode of the device they want. Brute force algorithms match a code with all possible combinations of numbers.

This means that eventually, all brute force algorithms yield a successful result. However, the viability of using a brute force algorithm lies in how long it takes for it to crack the passcode. This is where the trick lies. If you have a 6 digit passcode of your iPhone, that means that there are 10^6 possible combinations to be tested.

This takes about 24 hours to do, but not even all the combinations need to be tested after a match is found, so an average of 11 hours is required for cracking a usual 6 digit passcode. This is not a small time, but still bearable, considering the value of data obtained thereafter. However, change that passcode from 6 digits to 11 digits, and the time required to get a match would shoot up to 127 years! Surely no one would sit around for that long time.

This is a simple way to prevent the FBI from gaining access to your iPhone’s data should they get their way with Apple. However, there are two things of importance. The first is to use a random 11-digit number as a passcode and not a phone number, birthdate, social security number, etc., for such matches are easier to find. Also, it is important not to use touch IDs, since it is fairly simple for legal authorities to get your thumb or finger impression on your device.

One might think here that why is so much fuss required to lock your phone away from authorities. Well, it is within the rights of legal agents to confiscate your digital devices for hours when you travel internationally. Even local police officers can get a warrant to search your phone within 15 minutes these days. So, it is important to take this preventive measure as soon as possible.

  • Tags
  • Android
  • Apple
  • Encryption
  • FBI
  • Google
  • iPhone
  • Privacy
  • security
  • Terrorism
Facebook Twitter LinkedIn Pinterest
Previous article Anonymous Hacker Behind “OpJustina” Arrested by The FBI
Next article Selfie Crazy Tourists Responsible for Tragic Death of Rare Baby Dolphin
Ali Raza

Ali Raza

Ali Raza is a freelance journalist with extensive experience in marketing and management. His work has been featured in many major crypto and tech websites including Hacked, Hackread, ValueWalk, Cryptoslate, CCN, and Globlecoinreport to name a few. Raza is the co-founder of 5Gist.com, too, a site dedicated to educating people on 5G technology.

Related Posts
Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

47
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

85
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

107

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us