Forums
New posts
Search forums
What's new
New posts
New media
New media comments
New profile posts
Latest activity
Media
New media
New comments
Search media
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
Forums
Other Stuff
Off Topic
Not an "Apple Guy" or an iPhone Guy, But Wow. Just... Wow!
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Horoscope Fish" data-source="post: 534601" data-attributes="member: 13090"><p>Apple's encryption technology is pretty intense. For current iPhones you have a fingerprint scanner. That scanned biometric information, along with your password, is stored in a separate and semi-isolated chip; in effect a hardware-based solution which is HLS (High Level S--t) all by itself. Apple goes further though... That scanned data is then encrypted at the user-level, meaning Apple doesn't know the key, can't get the key nor can they generate a key of their own. </p><p></p><p>Attempts to "Brute Force" your password, the most common method of "hacking" a password, are defeated by "Time Out" protections. This mean if someone enters the wrong password too many times in a row, the user won't be able to make another attempt at entering the password for, say, two minutes. Additional failures at entering the correct password make for even *longer* time-out periods; something along the lines of eight or ten minutes if memory serves. If you want, you can even enable your iPhone to "wipe" all the data it contains (and I mean EVERYTHING) after too many incorrect password are attempted. This is something the FBI very much does NOT want to happen to these phones. </p><p></p><p>So yeah... Apple is not screwing around with their encryption and I applaud them for it, personally.</p></blockquote><p></p>
[QUOTE="Horoscope Fish, post: 534601, member: 13090"] Apple's encryption technology is pretty intense. For current iPhones you have a fingerprint scanner. That scanned biometric information, along with your password, is stored in a separate and semi-isolated chip; in effect a hardware-based solution which is HLS (High Level S--t) all by itself. Apple goes further though... That scanned data is then encrypted at the user-level, meaning Apple doesn't know the key, can't get the key nor can they generate a key of their own. Attempts to "Brute Force" your password, the most common method of "hacking" a password, are defeated by "Time Out" protections. This mean if someone enters the wrong password too many times in a row, the user won't be able to make another attempt at entering the password for, say, two minutes. Additional failures at entering the correct password make for even *longer* time-out periods; something along the lines of eight or ten minutes if memory serves. If you want, you can even enable your iPhone to "wipe" all the data it contains (and I mean EVERYTHING) after too many incorrect password are attempted. This is something the FBI very much does NOT want to happen to these phones. So yeah... Apple is not screwing around with their encryption and I applaud them for it, personally. [/QUOTE]
Verification
Post reply
Forums
Other Stuff
Off Topic
Not an "Apple Guy" or an iPhone Guy, But Wow. Just... Wow!
Top