How Locked iPhones are Being Cracked - Technical

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 391

  • @itsoowan2763
    @itsoowan2763 7 месяцев назад +93

    this video is fucking perfect for my digital forensics group project, thank you for being the first place ive found online that actually goes in depth explainin how data is extracted instead of just saying "they connect it to lab equipment and perform physical or logical extraction". even my lecture slides dont come close to this in depth

  • @WaywardPondering
    @WaywardPondering 6 месяцев назад +243

    To prevent hacking, remove half of the battery and pack C4 in the empty space which activates on detection of usb cable being plugged in. Just an idea that seems doable.

    • @realtimecyber
      @realtimecyber  6 месяцев назад +27

      Haha

    • @iRelevant.47.system.boycott
      @iRelevant.47.system.boycott 6 месяцев назад +11

      It's a decades old concept. That already have been used.

    • @bluestone-gamingbg3498
      @bluestone-gamingbg3498 6 месяцев назад +4

      It doesn't have to be half, C4s are plastic explosives so you can just have enough where it matters like on the SoC and Flash storage.

    • @garystinten9339
      @garystinten9339 6 месяцев назад +4

      Why not instead of plugging in a USB.. have a txt sent via another phone

    • @kemarchristie6050
      @kemarchristie6050 5 месяцев назад +1

      🤣🤣🤣🤣🤣🤣🤣🤣

  • @johnt.8205
    @johnt.8205 8 месяцев назад +37

    Discovered a goldmine of information in this channel! Highly technical yet highly enjoyable as well. Keep up the good work!

    • @phr3ui559
      @phr3ui559 6 месяцев назад

      yep good channel

  • @CaptPickguard
    @CaptPickguard 6 месяцев назад +454

    AI generated voice is well done but you can still tell.

    • @peppigue
      @peppigue 6 месяцев назад +47

      seems real to me. more dynamic than ai

    • @superfitcs4005
      @superfitcs4005 6 месяцев назад +16

      It feels more like ai

    • @bobsoup2319
      @bobsoup2319 6 месяцев назад +25

      @@peppiguebro went bell-are-us for Belarus 😭

    • @ConsciousBrosCommunity
      @ConsciousBrosCommunity 6 месяцев назад +17

      @@peppigue 7:43 Listen to the way he says firmware

    • @JánosKovicz
      @JánosKovicz 6 месяцев назад +2

      thought it was just me

  • @ferivertid
    @ferivertid Год назад +38

    criminally underrated channel

    • @TheAsianKidxD
      @TheAsianKidxD 5 месяцев назад +2

      Underrated criminal channel

  • @souhailtag4588
    @souhailtag4588 Год назад +11

    one of my favorite channels rn. don't stop making content !

  • @LegioXXI
    @LegioXXI 4 месяца назад +10

    When it comes to the brute force attacks, the best protection is to still use an alphanumeric password and not just some digits as passcode. This increases the time needed to crack from hours to years, giving you enough time to wipe the phone from your online account or simply rendering many data on the phone obsolete over so much time, especially saved login-data for 3rd parties.

  • @adrienagreste6768
    @adrienagreste6768 2 года назад +19

    I think you need to advertise this channel...
    It has good content but it’s not getting out there
    I stumbled on this by accident but the content is mind blowing

    • @realtimecyber
      @realtimecyber  2 года назад +4

      Thanks! Glad you liked it! We're considering doing some advertisement...

    • @emzgalante2640
      @emzgalante2640 Год назад +4

      The wider percentage of society can’t understand, process or digest this supremely valuable information. The 95% of social sheep in our population can’t concentrate for long enough to digest this fantastic info . Thank god I’m a proud geek and analytically wired

  • @everettvincent1688
    @everettvincent1688 11 месяцев назад +10

    How does lockdown mode work to prevent unauthorized access via these methods? Always wondered what additional measures are in place to prevent someone from cracking the passcode via cable, etc.

    • @realtimecyber
      @realtimecyber  11 месяцев назад +7

      Obviously Apple is pretty secretive about their technology, so it’s speculation. But likely close the APIs and other interfaces, that normally take some data from connections.

    • @ImperiumLibertas
      @ImperiumLibertas 6 месяцев назад +6

      Lockdown mode just disables features that are common attack vectors. It's an extreme measure that renders many convince features unusable like system and message notifications and others.
      The two most common areas I've seen exploited on iso for remote exploit are the notifications engine and text messages.

  • @kevinwydler7305
    @kevinwydler7305 Год назад +5

    Really well explained! I love that you didn't mix up or wrongly interpret the technical data! Makes for a very factual and informative video

    • @realtimecyber
      @realtimecyber  Год назад +1

      Glad you liked it. We definitely lost our minds while we were deep in the technical weeds 🤣

    • @QueenElsa1999
      @QueenElsa1999 Год назад

      Can't you just block external connections?

    • @realtimecyber
      @realtimecyber  Год назад

      @@QueenElsa1999 If you turn on lockdown mode. Otherwise when you plug in it prompts for the pin, so there's some attack surface.

  • @VulcanOnWheels
    @VulcanOnWheels 6 месяцев назад +4

    0:19 Shouldn't the emphasis in the name of Belarus be on the last syllable?

  • @alexk4894
    @alexk4894 6 месяцев назад +13

    Seriously, I completely understand why it is almost impossible to write a complex software like a web browser without vulnerabilities. But WHY it's so hard to write 2-4Kb boot ROM or TPM firmware without CRITICAL vulnerability?? I wish one day Apple/Qualcomm hires someone from industrial or aerospace sector just to write a simple and secure boot firmware for their new chip.
    Successful attack to a "data at rest" makes me mad

    • @teknixstuff
      @teknixstuff 6 месяцев назад +1

      Crypto is hard, and anyway jailbreaking is good (just it should require user authorisation)

    • @GuidedPirate
      @GuidedPirate 5 месяцев назад

      They're in on it

    • @eliasgoette
      @eliasgoette Месяц назад

      ​@teknixstuff Sorry, but good for what?
      Honest question, not trying to mess with ya 🤙

  • @philjack8535
    @philjack8535 6 месяцев назад +4

    Phenomenal explanation on every topic🎉

  • @bigchill-ph8bi
    @bigchill-ph8bi 10 месяцев назад +3

    Concise and informative. Thank you!

  • @pierpa_76pierpaolo
    @pierpa_76pierpaolo 11 месяцев назад +5

    Where can I find this program? Thank you very much.

  • @seansingh4421
    @seansingh4421 Месяц назад +1

    Cold boot attacks, basically they are able to extract encryption keys that are locally stored in the memory before the storage is booted. Once those keys are obtained they can easily decrypt the data. They also imitate the DNS of apple servers

  • @THazebomb
    @THazebomb 3 месяца назад

    So how are people receiving nfa in cases related images apparently that were on the phone? How weren't they recovered? What makes them unrecoverabke

  • @LaythSlewa-xu8mq
    @LaythSlewa-xu8mq 6 месяцев назад +2

    how does it look like on the legal side of life given the software is the property of manufacturer? can these companies not be sued by Apple or have the tools banned?

    • @realtimecyber
      @realtimecyber  6 месяцев назад +1

      Not sure. We’re not attorneys.

    • @ImperiumLibertas
      @ImperiumLibertas 6 месяцев назад +1

      You are free to run whatever software you want on devices you own as long as you are not distributing copyrighted material. LE bypass the consent issue with warrants or the unconstitutional but yet still in law FISA system.

  • @ivanzhukov4532
    @ivanzhukov4532 Год назад +12

    BELARUS MENTIONED!!!!!! 🎉🎉🎉🎉🎉🎉

  • @DreagNohud
    @DreagNohud 5 месяцев назад +1

    I'm sure it's hard to crack an iPhone if you scratch off a few of the pins on the lightning cable. Did you find the ones that are just for charging I think you'll be good. Or you could use NFC charging or qi charging whatever the hell it's called

    • @snoopdogie187
      @snoopdogie187 Месяц назад

      Wireless charging, qi charging, etc. I don't know how many people still remember qi unless you were an earlier adaopter of this tech.NFC is more about data.

  • @oglothenerd
    @oglothenerd 6 месяцев назад +4

    This was a good video! I cannot tell if the voice was AI or not though.

  • @sloopycat1954
    @sloopycat1954 5 месяцев назад

    ICLOUD LOCKED iPhone 13 pro max UNLOCKING information I was looking for, would the IPhone 13 pro max with ICLOUD LOCK be useable again if the LOGIC-BOARD or MOTHER-BOARD was replaced with a UNLOCKED BOARD, I would really appreciate any help thankyou. Great video thankyou.

  • @jspencer89yt
    @jspencer89yt 6 месяцев назад +6

    With AI emerging this is going to be a growing cat and mouse game

    • @king_james_official
      @king_james_official 6 месяцев назад +4

      could you tell this video's voice is ai-generated?

    • @jspencer89yt
      @jspencer89yt 6 месяцев назад +1

      @@king_james_official wow I listened again so right

  • @oHacks.
    @oHacks. 6 месяцев назад +4

    The new iphone se 2nd gen and 3rd gens are not exploitable to the same as the iPhone 6 - X exploit because they have newer A series processors when those older jailbreakble and exploitable phones have older a8 - a11 processors a12 and newer patched it

    • @iRelevant.47.system.boycott
      @iRelevant.47.system.boycott 6 месяцев назад

      If it is jailbreakble it is hackable. A fake OS running fake Apps.

    • @oHacks.
      @oHacks. 6 месяцев назад +1

      @@iRelevant.47.system.boycott yup

    • @KingKhan20000
      @KingKhan20000 4 месяца назад

      So if police have my iphone 11 max pro, i refused to give passcode will they get in? Plus for some reason they told me to shut the phone down when i handed it over to them, meaning the face ID wont work.

    • @oHacks.
      @oHacks. 4 месяца назад

      @@KingKhan20000 as far as I know with most tools no if its updated because that phone is not checkmate jailbreakable and turning it off encrypts the data

    • @KingKhan20000
      @KingKhan20000 4 месяца назад

      @@oHacks. Not sure if its updated I think the ios is still the 2020 one. But I was told to shut it down in the house then they took it after so idk...

  • @garystinten9339
    @garystinten9339 6 месяцев назад +1

    Are these devices availabke one aliexpess yet?

  • @mjf7662
    @mjf7662 Месяц назад +1

    Any suggestions to cracking the passcode on my Iphone XR? I dont have the apple id and it wasnt my phone. We met at walmart and I checked out the phone before buying it. I didnt bring cash so I went inside walmart to use an atm. He gave me a different phone when I paid him. It looked the same, same color and everything except this one has a passcode and the other one didnt. Or maybe he put a passcode on it while i was in the store. Yes, im an idiot for not checking it again before I gave him my money. I dont mind paying for a program to get my phone unlocked but nothing expensive because I can buy a new phone if thats the case.

    • @snoopdogie187
      @snoopdogie187 Месяц назад

      You can try 3U tools or Eelphone iPhone Unlock. I never tried either. If it is a locked phone, it might be blacklisted anyway.

    • @MarcinArken
      @MarcinArken Месяц назад

      @@snoopdogie187He can’t do nothing because USB Debugging isn’t enabled for his PC anyway

  • @G8YTZ
    @G8YTZ 5 месяцев назад

    I guess if you had something to hide a simple solution might be to drill a little hole through the USB interface chip and rely instead on wireless charging for the phone. Not perfect but would make life a lot more difficult.
    You could of course booby trap the device to short the battery out if remote wipe was instigated, a handshake wasn’t received for a few days or on 10 failed unlocks.

  • @scubasteve4053
    @scubasteve4053 10 месяцев назад +3

    Can a regular civilian buy this?

    • @ImperiumLibertas
      @ImperiumLibertas 6 месяцев назад +1

      It is unlikely unless you're a security researching firm and have millions of dollars since the exploits they utilize are very valuable and are mostly illegal unless you have consent from the owner of the device.

    • @iRelevant.47.system.boycott
      @iRelevant.47.system.boycott 6 месяцев назад

      No.

    • @sonyamano3434
      @sonyamano3434 Месяц назад

      No for shure

  • @SabbirImon
    @SabbirImon 6 месяцев назад +1

    Thanks , its highly detailed❤❤❤

  • @alfonsospencer1035
    @alfonsospencer1035 2 года назад +2

    Great work on this one. 👍

  • @kemarchristie6050
    @kemarchristie6050 5 месяцев назад +5

    Wanna see them try this on a 14 Pro max or 15 pro max/ by the time they crack these there would be iPhone 21 and 22 pro max already out

    • @realtimecyber
      @realtimecyber  5 месяцев назад +2

      An unpatchable side channel attack vulnerability (analyzing behavior of the chips) that allows extraction of secret keys was actually just discovered in M1 macs. Those are only a few years old. So never say never.

    • @kemarchristie6050
      @kemarchristie6050 5 месяцев назад

      @@realtimecyber Never said never but i mean for now its not possible. there is always a work around tho as innovation is daily so

    • @Joel-o7x
      @Joel-o7x 3 месяца назад

      Se puede hacer estos ah un 12 pro Max ?

    • @jaestreets751
      @jaestreets751 3 месяца назад +1

      If you can’t jailbreak a iPhone and lower the security it will be very hard to hack. As you would either need that PIN number apple sends to access the phone. 2FA.
      But I believe the ones that CAN be jailbroken are easier to hack. The others that can’t you’ll probably need physical access to either usb attack or brute force.

  • @christophermanners3838
    @christophermanners3838 Месяц назад

    Were can I buy this tool

    • @de_nstream
      @de_nstream Месяц назад

      Nearest FBI office if in the US.

  • @Dr_Larken
    @Dr_Larken 5 месяцев назад +1

    I just wanna point out when you start your iPhone and type in the password for the first time then all of this is possible! But if you were going about your day and let’s just say you get arrested, hold down the power button where you can slide to shut your iPhone off. Once you do that encrypt your entire phone and they can’t pull this off.
    So yeah, this is possible , but not if you just turn your phone on for the first time and have it entered your password!
    Also, if your password is a couple of digits , you might wanna rethink your password! Alphanumerically is better! Especially if you’re using for example English letters and Russian Cyrillic along with numbers and special characters! I’m just saying if you’re never in that situation someone’s gonna come back to you really pissed off wanting you to enter your password backing it up with a few threats!
    But I can guarantee you it will be the greatest feeling ever when you’re able to tell them no, and there’s shit they can do about it!

  • @NonstickMilk
    @NonstickMilk 6 месяцев назад +5

    You lost me after about 3 minutes but I continued watching until the end because it was still interesting even if I had no clue what the hell you were talking about. Hey, I am an old truck mechanic, not a digital expert.
    But it did make me wonder; it appears that in some cases the phone might be damaged to get the data out of it. So what happens when nothing useful was recovered and the person that owned the phone was completely innocent? Does the FBI (or whoever) say "sucks to be you"
    I suppose an innocent person might willingly let the FBI look through their phone if they had nothing to hide so that all of this wouldn't be necessary.
    Then again, when my sister in law took her own life a couple years ago, my wife wanted to look through her iPhone to see what was going on in her life during her last days. Without an unlock code, we were out of luck and certainly couldn't do anything like this. Perhaps its better that we didn't know. My wife had endured enough anguish having to bury her sister. No reason to add fuel to the fire.

    • @vlc-cosplayer
      @vlc-cosplayer 6 месяцев назад +4

      "an innocent person might willingly let the FBI look through their phone if they had nothing to hide"
      The FBI will make sure to plant something that you'll want to hide, so that they can put you in the slammer, and look like the heroes with zero effort on their part. 💀

    • @ImperiumLibertas
      @ImperiumLibertas 6 месяцев назад

      ​@@vlc-cosplayernothing to hide and nothing to share. I don't want control freaks or government glowies to have access to my data.
      Taking away normal people's privacy will not reduce crime in any way. The criminals will just continue to use secure anonymous systems. Taking away peoples privacy serves one purpose to allow the government to control and suppress people the deem a threat to their agenda.

  • @gavan4138
    @gavan4138 Год назад +2

    Love your content

  • @oscar3611
    @oscar3611 5 месяцев назад +1

    AI voice is really impressive. When the little mistakes are taken care off, the real problems will start.

  • @michael96701
    @michael96701 Год назад

    so would the latest iphone and latest software update be impenetrable?

    • @realtimecyber
      @realtimecyber  Год назад +4

      Unclear. They are definitely more secure. But some claim to be able to crack them.

    • @tamirrothschild
      @tamirrothschild Год назад +1

      Just don't do crimes, specifically on your phone

    • @SensibleCentrist
      @SensibleCentrist 8 месяцев назад +3

      @@tamirrothschild”crime” is just whatever what power decides, next week you could be guilty of a “crime” that you do everyday on your phone right now.

    • @peterberg12353
      @peterberg12353 7 месяцев назад

      @@SensibleCentristalso some schools use these services. Phones of students could easily unkocked and the data collected.

    • @tamirrothschild
      @tamirrothschild 7 месяцев назад

      ​@@SensibleCentrist well i do sell crack on my phone rn hope that no illegal next week, but most staff you can do on your phone are staff you can do properly on a computer with tor, that way i like to not sell crack

  • @SERGE_Tech
    @SERGE_Tech 10 месяцев назад +2

    Wow pretty cool channel

  • @ah7072
    @ah7072 9 месяцев назад +2

    Can you do one about
    What data police can get from whats app

  • @remybuitenhuis2433
    @remybuitenhuis2433 Месяц назад

    very interesting

  • @iexist6021
    @iexist6021 8 месяцев назад +2

    The poorly named Patriot Act opened the door for this.

  • @angrybirds2472
    @angrybirds2472 6 месяцев назад +2

    they dont actually crack the encryption

  • @moeblanco8222
    @moeblanco8222 8 месяцев назад

    So iPhone 11 with iOS 16.7.2 can’t be brute password hack

  • @hv4329
    @hv4329 5 месяцев назад

    The editing makes the video hard to follow. There are a lot of useless cuts and random gifs that don't have anything to do with the context.

  • @fredflintstoner596
    @fredflintstoner596 3 месяца назад

    Mrs Richards: "I paid for a room with a view !"
    Basil: (pointing to the lovely view) "That is Torquay, Madam ."
    Mrs Richards: "It's not good enough!"
    Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window ? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically across the plains?..."
    Mrs Richards: "Don't be silly! I expect to be able to see the sea!"
    Basil: "You can see the sea, it's over there between the land and the sky."
    Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction."
    Basil: "Why?! Because Krakatoa's not erupting at the moment ?"

  • @unlockitnow-y3w
    @unlockitnow-y3w Год назад +2

    Those files are not stolen. They are included in itunes.

    • @realtimecyber
      @realtimecyber  Год назад +4

      Its against their terms of service reverse engineer them, or use them for things like this.

    • @unlockitnow-y3w
      @unlockitnow-y3w Год назад

      @@realtimecyber as someone who has a touch 1, touch 2, ufed4pc, and physical analyzer I can tell you now the information you posted is missing critical details. ITunes is required to be installed prior to you installing the Ufed Touch software. Its not reverse engineering their code. Its using the stock OEM files and the proof of it is that the digital certificate was untampered. The screenshot only proves the files are in the correct directories after iTunes and Apple Application Services are installed.

    • @ImperiumLibertas
      @ImperiumLibertas 6 месяцев назад

      ​@@realtimecyber against terms of service or not they are files on your machine and you are free to do whatever you want with them as long as you're not distributing copyrighted material. You can claim cryptographic keys are copyrighted and are properties of apple so distributing them would be illegal but the mere act of reverse engineering is not.
      Still if the tool extracts those keys at runtime on the device itself then there is nothing apple can do. They cannot use legal means to stop you from running code on your own devices.

    • @realtimecyber
      @realtimecyber  6 месяцев назад +1

      @@ImperiumLibertas They are distributing the material; cellebrite is a publically traded company that sells devices to crack iphones.

  • @patrikisgod
    @patrikisgod Месяц назад

    Apparently, students at the HS I work at unlock phones for $5, wouldn't surprise me if they can do the new iPhones

  • @George-ps5
    @George-ps5 11 месяцев назад

    Awesome vid

  • @iRelevant.47.system.boycott
    @iRelevant.47.system.boycott 6 месяцев назад

    Cool vid. Thanks.

  • @LoserDub
    @LoserDub 6 месяцев назад

    so can i buy cheap locked phones or not?

  • @IgorL-rv1mn
    @IgorL-rv1mn 6 месяцев назад

    They use a wire mesh and radio signals ran across the surface that is made wet. They first access the Camara than charging system and finally the whole phone.

    • @ImperiumLibertas
      @ImperiumLibertas 6 месяцев назад

      Are you saying they use electromagnetic fields to power certain parts of the device independently? If that is even remotely true that is insanity cool.
      Do you have a source for that I can read up on?

  • @carsonjamesiv2512
    @carsonjamesiv2512 6 месяцев назад +1

    I MUST RE-WATCH THIS VIDEO!😀😎👍

  • @lostsauce0
    @lostsauce0 6 месяцев назад +2

    What the fuck is this? Actual good info in an AI voice video?!? 👍

  • @donelson52
    @donelson52 Месяц назад

    What about iPhone 15 Pro Max

  • @elsuperpollo2273
    @elsuperpollo2273 5 месяцев назад

    This makes me want to use a dumb phone or tell my family they can get thier amateur radio license and continue using my tablet and laptop.

  • @Cruel_Shoes
    @Cruel_Shoes Месяц назад +1

    This would be great for insomniacs.

  • @edwindol3597
    @edwindol3597 6 месяцев назад +1

    A LOT OF INFO! now how about enterprise iphones that are remotely managed? i didn't hear anything about that? At work here they say not hackable LOL

    • @realtimecyber
      @realtimecyber  6 месяцев назад +2

      For the most part a MDM cannot prevent most of this, the hardware vulnerabilities still exist, it could enable some of the newer protections, and possibly reduce the attack surface by disabling certain functionality. It could also remotely wipe a device before its cracked, assuming the device isnt put into a faraday pouch which is common practice before cracking a seized device.

  • @dupreecalfee9030
    @dupreecalfee9030 3 месяца назад

    If they haven’t already, Apple needs to buy this and work against it.

  • @CantStayImAThrowaway
    @CantStayImAThrowaway 5 месяцев назад +1

    Am a fed. Can confirm.

  • @1SlipperyPenguin
    @1SlipperyPenguin 6 месяцев назад +1

    Interesting

  • @anonym9491
    @anonym9491 6 месяцев назад +1

    Good vibes

  • @BryantAvant
    @BryantAvant 5 месяцев назад

    The FBI doesn't crack them. Apple gives them access in exchange for government favors.

    • @jatindsaini
      @jatindsaini 5 месяцев назад

      You may be right,in my country India, government had purchased Israel hacking softwares secretly, still they had to request Apple for unlocking an arrested opposition leader's iphone which Apple thankfully denied.

  • @MYKEYK25
    @MYKEYK25 9 месяцев назад +1

    So can you unlock a 13 pro w/o the password or not?

    • @alexiiconner
      @alexiiconner 8 месяцев назад +1

      government program

    • @sicarioga676
      @sicarioga676 7 месяцев назад

      Stop stealing peoples phones 😠😠😠😠😊

    • @sicarioga676
      @sicarioga676 7 месяцев назад

      Stop stealing peoples phones 😠😠😠😠😠😠

  • @nicholastoo858
    @nicholastoo858 6 месяцев назад

    CIA backdoors. They can’t let that opportunity go. Millions of people use iPhones globally.

  • @univera1111
    @univera1111 6 месяцев назад +2

    Why window. Where are my Linux advocate 😂😂😂

    • @FFNUser
      @FFNUser 6 месяцев назад

      Because no iTunes on Linux

  • @DR3W1877
    @DR3W1877 7 месяцев назад +31

    Apple could stop them getting in if they WANTED TO!

    • @Technobitz
      @Technobitz 7 месяцев назад +10

      I doubt it, if they don’t know what they’re up against then they can’t fight it

    • @michaeljohndennis2231
      @michaeljohndennis2231 7 месяцев назад +2

      If Apple did so, this would be a highly socially irresponsible move - since 9/11, we have to accept the reality of the fact that our digital communications must be closely monitored - some countries are even banning VPN’s and antivirus and they closely monitor and restrict their mobile phone and internet networks, where in some cases, the possession of certain devices is illegal in certain countries

    • @JC-kk4ph
      @JC-kk4ph 6 месяцев назад +10

      Nope, the companies don't tell aple about the vulnerabilities for obvious reasons so they can't fix what they don't know about.

    • @Technobitz
      @Technobitz 6 месяцев назад

      @@JC-kk4ph that’s what there business model is

    • @michaelzborovan4362
      @michaelzborovan4362 6 месяцев назад

      Not necessarily the case, remember a few years back when that muslim couple was killed in a chase for some terrorist shooting or whatever, I believe it was San Francisco or at least western us...
      Anyway, the feds first asked Apple to open the phones and Apple said absolutely not...(owners are dead BTW and feds saying there could be links to other terrorists on the phones etc...) well it goes to court and Apple is still refusing on the basis of customer trust and they're not violating that... period.
      All the sudden us stops asking or fighting it... out of the news...few weeks later comes out Isreal intelligence offered to open them for the us.... and I'm sure exchanged some techniques about it...
      Isreal is the bleeding edge of weaponized cyberwarfare and militarized hacking at all levels necessary to their needs.

  • @emacarvalho7889
    @emacarvalho7889 10 месяцев назад

    I understand the purpose but what if this falls into the wrong hands? Also, suppose you are writing a novel or poetry.wouldn't that allow anyone to steal your work?… So... Is it why the EU is forcing apple to use USB-C?

    • @ImperiumLibertas
      @ImperiumLibertas 6 месяцев назад +2

      No the plug standard does not determine the security of the system. The security is mostly done on chips on the motherboard like the trusted processing unit (TPU) and the central processing unit (CPU). The plug is just the standard way data goes in and out but doesn't determine what data goes in or out.

    • @iRelevant.47.system.boycott
      @iRelevant.47.system.boycott 6 месяцев назад

      The USB-C thing is about creating a common charging standard between manufacturers. To reduce electronic waste.

    • @RoyalGxng
      @RoyalGxng 6 месяцев назад

      This is already in the wrong hands

  • @johnkeo358
    @johnkeo358 5 месяцев назад

    These commercials are getting out of hand

  • @1SlipperyPenguin
    @1SlipperyPenguin 6 месяцев назад

    Makes sense now why Apple wants to go wireless

    • @realtimecyber
      @realtimecyber  6 месяцев назад

      Wireless will likely have similar vulnerabilities

  • @DaveSherry-z1w
    @DaveSherry-z1w Месяц назад

    Less than ethical regimes in Russia? What a frucking laugh coming from a sceptic tank.

  • @MiguelDeMarchena
    @MiguelDeMarchena 6 месяцев назад +2

    I wish all luck possible to the one that dare try to hack my nokia 3310 i do not even save contacts because i dial manually from memory, technology is the nemesis of privacy.

    • @mestari6289
      @mestari6289 Месяц назад

      It uses GSM which can be broken by anyone with some knowledge.

    • @MiguelDeMarchena
      @MiguelDeMarchena Месяц назад

      @@mestari6289 yes but that confirms my point, What data would be obtained from a phone that is only used to call and receive calls with no banking apps nor social media apps or anything related to my person except the phone number

    • @MiguelDeMarchena
      @MiguelDeMarchena Месяц назад

      there is always a way in, nothing is 100% private and if it has software to work can be hacked but the point on hacking is to obtain something of value, it is dumb to steal an empty safe to waste time and energy opening it to get nothing.

  • @cornpopthebaddude3992
    @cornpopthebaddude3992 Месяц назад

    Or just clear your phone thru iCloud remotely once they are in possession of the phone 😂

  • @emko333
    @emko333 6 месяцев назад +6

    artificial narrator

    • @realtimecyber
      @realtimecyber  6 месяцев назад +1

      Didn't pass the turing test?

  • @danqaddoamps2209
    @danqaddoamps2209 Год назад +3

    My friend was fully convinced no one can hack an iPhone and view data😂😂😂😂😂😂😂😂

    • @realtimecyber
      @realtimecyber  Год назад

      Share this video🤣

    • @violetfox115
      @violetfox115 Год назад +2

      now you can say no one who gives enough of a shit about him or doesn't have the money can hack his iPhone

  • @todor_todorov
    @todor_todorov 2 месяца назад +2

    Who the fuck uses iPhone 5 anyway 😂

  • @zsck8h1qlj6
    @zsck8h1qlj6 5 месяцев назад

    If Signal Team can get it Apple is definitely can get them

  • @wishunter9000
    @wishunter9000 Год назад +14

    Oh my god, I know more about computers than the average ~20 year old but I had not idea how complex computers and smartphones really are 😳😳😳

    • @Locutus
      @Locutus 8 месяцев назад +3

      Smartphones are computers, just "pocket sized".

    • @shaclo1512
      @shaclo1512 6 месяцев назад +2

      I doubt that android phones have a similar security

    • @elsuperpollo2273
      @elsuperpollo2273 5 месяцев назад

      Another reason not to use smartphones, use amateur radio like ft8, other digital modes so these companies cant track you, but the FCC and other amateur radio operators can.

  • @artist81317
    @artist81317 Год назад +3

    Install software thats wipes your phone if a data cable is connected.

    • @realtimecyber
      @realtimecyber  Год назад +2

      good luck charging

    • @Ragin.Official
      @Ragin.Official Год назад +2

      And data is never really wiped until it’s over written

    • @realtimecyber
      @realtimecyber  Год назад +2

      Yea, just the pointer is deleted. @@Ragin.Official

    • @Mariusz-mq2tg
      @Mariusz-mq2tg 9 месяцев назад +1

      ​@@Ragin.Official Not true, on android 7+ after factory reset is performed the encryption key gets replaced so you cant recover any data that was there before.

  • @albak0
    @albak0 5 месяцев назад

    Geesh the longest scene I’ve seen were 4 seconds
    Disappointed

  • @KirkRagland
    @KirkRagland 5 месяцев назад

    LOL listing the US then saying less than "ethical regimes" and then listing a bunch of countries, you act like the US is ethical.

  • @nicolaslutchman7266
    @nicolaslutchman7266 6 месяцев назад +1

    the X in iphone X is pronounced 10. its roman number

  • @fannywayne1920
    @fannywayne1920 7 месяцев назад +6

    i understood nothing you said lol

  • @Jedi-Nite
    @Jedi-Nite 3 месяца назад

    Can apple sue?

  • @CossieChris
    @CossieChris Месяц назад

    I started tuning out when I heard the artificial voice and poor grammar which highlights them so easily.

  • @will-todman
    @will-todman Месяц назад +1

    Of course cellebrite is an Israel based company

  • @ali-amaankhan3657
    @ali-amaankhan3657 5 месяцев назад

    ty for telling us it a boycott product

  • @KingKhan20000
    @KingKhan20000 4 месяца назад +1

    Will Uk police get into an 11 max pro?

    • @will00709
      @will00709 4 месяца назад

      yeah

    • @KingKhan20000
      @KingKhan20000 4 месяца назад

      @@will00709 Do they try harder for certain crimes?

    • @Meljoseph-dl3eb
      @Meljoseph-dl3eb 3 месяца назад

      mate unless the crime poses a national threat they won’t bother.

    • @KingKhan20000
      @KingKhan20000 3 месяца назад

      @@Meljoseph-dl3eb Really? So if its an 11 max pro that got shut down before giving to them... they wont bother to get in?

    • @Meljoseph-dl3eb
      @Meljoseph-dl3eb 3 месяца назад

      @@KingKhan20000 what offence was the phone seized for?

  • @AnthonyChopra
    @AnthonyChopra Месяц назад

    if youre phone could have removable storage it be safe after selling hahah

  • @cody_raves
    @cody_raves 5 месяцев назад

    the AI voice is soooo cursed

  • @redslashed
    @redslashed 6 месяцев назад

    i am scared of celebrite now

  • @nin1ten1do
    @nin1ten1do 5 месяцев назад

    I USING z3x A 10+years.. tf you crackinbg nabout XD

  • @FragEightyfive
    @FragEightyfive 6 месяцев назад +1

    Something to keep in mind. If you have the time to watch this video, you are not important enough to have to worry about this.

    • @realtimecyber
      @realtimecyber  6 месяцев назад +1

      If you are a criminal and have one of the older vulnerable phones, any police department can crack your phone with a warrant.

  • @hugomeyer9027
    @hugomeyer9027 5 месяцев назад +1

    You lost me at implying that non western players are non ethical by default, as if the west is...

  • @noThankyou-g5c
    @noThankyou-g5c Месяц назад

    0:15 whats with the implication that our regime in the US are ethical lol?

    • @realtimecyber
      @realtimecyber  Месяц назад

      @@noThankyou-g5c We’re not saying the USA is perfect, but generally we don’t torture people and/or harvest their organs when they get arrested or detained by the police.

    • @cigaro6468
      @cigaro6468 Месяц назад

      @@realtimecyber oh yes mate, the United States has never tortured people in its history.

    • @cigaro6468
      @cigaro6468 Месяц назад

      @@realtimecyber do u know what guantanamo is?

  • @zaca211
    @zaca211 6 месяцев назад

    Criminals in uniform.

    • @realtimecyber
      @realtimecyber  6 месяцев назад

      If you are referring to the U.S they do this with a warrant and/or probable cause.

  • @SevenEleven7111
    @SevenEleven7111 7 месяцев назад +1

    They can’t gain any access passed iPhone 11 Pro Max.

    • @Kawasakibikerfreak
      @Kawasakibikerfreak 7 месяцев назад

      Crime wasnt big enough mb :)

    • @SevenEleven7111
      @SevenEleven7111 7 месяцев назад

      @@Kawasakibikerfreak Equipment isn’t good enough 😘

  • @um690s
    @um690s 5 месяцев назад

    ios 🥳

  • @1SlipperyPenguin
    @1SlipperyPenguin 6 месяцев назад

    This is the stuff ordinary people don’t think about

  • @atolliver91
    @atolliver91 6 месяцев назад

    Useless industries …. 9:01

  • @jonog4207
    @jonog4207 8 месяцев назад

    Moxiemarlinspike says this is boll#x