this video is fucking perfect for my digital forensics group project, thank you for being the first place ive found online that actually goes in depth explainin how data is extracted instead of just saying "they connect it to lab equipment and perform physical or logical extraction". even my lecture slides dont come close to this in depth
To prevent hacking, remove half of the battery and pack C4 in the empty space which activates on detection of usb cable being plugged in. Just an idea that seems doable.
When it comes to the brute force attacks, the best protection is to still use an alphanumeric password and not just some digits as passcode. This increases the time needed to crack from hours to years, giving you enough time to wipe the phone from your online account or simply rendering many data on the phone obsolete over so much time, especially saved login-data for 3rd parties.
I think you need to advertise this channel... It has good content but it’s not getting out there I stumbled on this by accident but the content is mind blowing
The wider percentage of society can’t understand, process or digest this supremely valuable information. The 95% of social sheep in our population can’t concentrate for long enough to digest this fantastic info . Thank god I’m a proud geek and analytically wired
How does lockdown mode work to prevent unauthorized access via these methods? Always wondered what additional measures are in place to prevent someone from cracking the passcode via cable, etc.
Obviously Apple is pretty secretive about their technology, so it’s speculation. But likely close the APIs and other interfaces, that normally take some data from connections.
Lockdown mode just disables features that are common attack vectors. It's an extreme measure that renders many convince features unusable like system and message notifications and others. The two most common areas I've seen exploited on iso for remote exploit are the notifications engine and text messages.
Seriously, I completely understand why it is almost impossible to write a complex software like a web browser without vulnerabilities. But WHY it's so hard to write 2-4Kb boot ROM or TPM firmware without CRITICAL vulnerability?? I wish one day Apple/Qualcomm hires someone from industrial or aerospace sector just to write a simple and secure boot firmware for their new chip. Successful attack to a "data at rest" makes me mad
Cold boot attacks, basically they are able to extract encryption keys that are locally stored in the memory before the storage is booted. Once those keys are obtained they can easily decrypt the data. They also imitate the DNS of apple servers
how does it look like on the legal side of life given the software is the property of manufacturer? can these companies not be sued by Apple or have the tools banned?
You are free to run whatever software you want on devices you own as long as you are not distributing copyrighted material. LE bypass the consent issue with warrants or the unconstitutional but yet still in law FISA system.
I'm sure it's hard to crack an iPhone if you scratch off a few of the pins on the lightning cable. Did you find the ones that are just for charging I think you'll be good. Or you could use NFC charging or qi charging whatever the hell it's called
Wireless charging, qi charging, etc. I don't know how many people still remember qi unless you were an earlier adaopter of this tech.NFC is more about data.
ICLOUD LOCKED iPhone 13 pro max UNLOCKING information I was looking for, would the IPhone 13 pro max with ICLOUD LOCK be useable again if the LOGIC-BOARD or MOTHER-BOARD was replaced with a UNLOCKED BOARD, I would really appreciate any help thankyou. Great video thankyou.
The new iphone se 2nd gen and 3rd gens are not exploitable to the same as the iPhone 6 - X exploit because they have newer A series processors when those older jailbreakble and exploitable phones have older a8 - a11 processors a12 and newer patched it
So if police have my iphone 11 max pro, i refused to give passcode will they get in? Plus for some reason they told me to shut the phone down when i handed it over to them, meaning the face ID wont work.
@@KingKhan20000 as far as I know with most tools no if its updated because that phone is not checkmate jailbreakable and turning it off encrypts the data
Any suggestions to cracking the passcode on my Iphone XR? I dont have the apple id and it wasnt my phone. We met at walmart and I checked out the phone before buying it. I didnt bring cash so I went inside walmart to use an atm. He gave me a different phone when I paid him. It looked the same, same color and everything except this one has a passcode and the other one didnt. Or maybe he put a passcode on it while i was in the store. Yes, im an idiot for not checking it again before I gave him my money. I dont mind paying for a program to get my phone unlocked but nothing expensive because I can buy a new phone if thats the case.
I guess if you had something to hide a simple solution might be to drill a little hole through the USB interface chip and rely instead on wireless charging for the phone. Not perfect but would make life a lot more difficult. You could of course booby trap the device to short the battery out if remote wipe was instigated, a handshake wasn’t received for a few days or on 10 failed unlocks.
It is unlikely unless you're a security researching firm and have millions of dollars since the exploits they utilize are very valuable and are mostly illegal unless you have consent from the owner of the device.
An unpatchable side channel attack vulnerability (analyzing behavior of the chips) that allows extraction of secret keys was actually just discovered in M1 macs. Those are only a few years old. So never say never.
If you can’t jailbreak a iPhone and lower the security it will be very hard to hack. As you would either need that PIN number apple sends to access the phone. 2FA. But I believe the ones that CAN be jailbroken are easier to hack. The others that can’t you’ll probably need physical access to either usb attack or brute force.
I just wanna point out when you start your iPhone and type in the password for the first time then all of this is possible! But if you were going about your day and let’s just say you get arrested, hold down the power button where you can slide to shut your iPhone off. Once you do that encrypt your entire phone and they can’t pull this off. So yeah, this is possible , but not if you just turn your phone on for the first time and have it entered your password! Also, if your password is a couple of digits , you might wanna rethink your password! Alphanumerically is better! Especially if you’re using for example English letters and Russian Cyrillic along with numbers and special characters! I’m just saying if you’re never in that situation someone’s gonna come back to you really pissed off wanting you to enter your password backing it up with a few threats! But I can guarantee you it will be the greatest feeling ever when you’re able to tell them no, and there’s shit they can do about it!
You lost me after about 3 minutes but I continued watching until the end because it was still interesting even if I had no clue what the hell you were talking about. Hey, I am an old truck mechanic, not a digital expert. But it did make me wonder; it appears that in some cases the phone might be damaged to get the data out of it. So what happens when nothing useful was recovered and the person that owned the phone was completely innocent? Does the FBI (or whoever) say "sucks to be you" I suppose an innocent person might willingly let the FBI look through their phone if they had nothing to hide so that all of this wouldn't be necessary. Then again, when my sister in law took her own life a couple years ago, my wife wanted to look through her iPhone to see what was going on in her life during her last days. Without an unlock code, we were out of luck and certainly couldn't do anything like this. Perhaps its better that we didn't know. My wife had endured enough anguish having to bury her sister. No reason to add fuel to the fire.
"an innocent person might willingly let the FBI look through their phone if they had nothing to hide" The FBI will make sure to plant something that you'll want to hide, so that they can put you in the slammer, and look like the heroes with zero effort on their part. 💀
@@vlc-cosplayernothing to hide and nothing to share. I don't want control freaks or government glowies to have access to my data. Taking away normal people's privacy will not reduce crime in any way. The criminals will just continue to use secure anonymous systems. Taking away peoples privacy serves one purpose to allow the government to control and suppress people the deem a threat to their agenda.
@@SensibleCentrist well i do sell crack on my phone rn hope that no illegal next week, but most staff you can do on your phone are staff you can do properly on a computer with tor, that way i like to not sell crack
Mrs Richards: "I paid for a room with a view !" Basil: (pointing to the lovely view) "That is Torquay, Madam ." Mrs Richards: "It's not good enough!" Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window ? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically across the plains?..." Mrs Richards: "Don't be silly! I expect to be able to see the sea!" Basil: "You can see the sea, it's over there between the land and the sky." Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction." Basil: "Why?! Because Krakatoa's not erupting at the moment ?"
@@realtimecyber as someone who has a touch 1, touch 2, ufed4pc, and physical analyzer I can tell you now the information you posted is missing critical details. ITunes is required to be installed prior to you installing the Ufed Touch software. Its not reverse engineering their code. Its using the stock OEM files and the proof of it is that the digital certificate was untampered. The screenshot only proves the files are in the correct directories after iTunes and Apple Application Services are installed.
@@realtimecyber against terms of service or not they are files on your machine and you are free to do whatever you want with them as long as you're not distributing copyrighted material. You can claim cryptographic keys are copyrighted and are properties of apple so distributing them would be illegal but the mere act of reverse engineering is not. Still if the tool extracts those keys at runtime on the device itself then there is nothing apple can do. They cannot use legal means to stop you from running code on your own devices.
They use a wire mesh and radio signals ran across the surface that is made wet. They first access the Camara than charging system and finally the whole phone.
Are you saying they use electromagnetic fields to power certain parts of the device independently? If that is even remotely true that is insanity cool. Do you have a source for that I can read up on?
For the most part a MDM cannot prevent most of this, the hardware vulnerabilities still exist, it could enable some of the newer protections, and possibly reduce the attack surface by disabling certain functionality. It could also remotely wipe a device before its cracked, assuming the device isnt put into a faraday pouch which is common practice before cracking a seized device.
You may be right,in my country India, government had purchased Israel hacking softwares secretly, still they had to request Apple for unlocking an arrested opposition leader's iphone which Apple thankfully denied.
If Apple did so, this would be a highly socially irresponsible move - since 9/11, we have to accept the reality of the fact that our digital communications must be closely monitored - some countries are even banning VPN’s and antivirus and they closely monitor and restrict their mobile phone and internet networks, where in some cases, the possession of certain devices is illegal in certain countries
Not necessarily the case, remember a few years back when that muslim couple was killed in a chase for some terrorist shooting or whatever, I believe it was San Francisco or at least western us... Anyway, the feds first asked Apple to open the phones and Apple said absolutely not...(owners are dead BTW and feds saying there could be links to other terrorists on the phones etc...) well it goes to court and Apple is still refusing on the basis of customer trust and they're not violating that... period. All the sudden us stops asking or fighting it... out of the news...few weeks later comes out Isreal intelligence offered to open them for the us.... and I'm sure exchanged some techniques about it... Isreal is the bleeding edge of weaponized cyberwarfare and militarized hacking at all levels necessary to their needs.
I understand the purpose but what if this falls into the wrong hands? Also, suppose you are writing a novel or poetry.wouldn't that allow anyone to steal your work?… So... Is it why the EU is forcing apple to use USB-C?
No the plug standard does not determine the security of the system. The security is mostly done on chips on the motherboard like the trusted processing unit (TPU) and the central processing unit (CPU). The plug is just the standard way data goes in and out but doesn't determine what data goes in or out.
I wish all luck possible to the one that dare try to hack my nokia 3310 i do not even save contacts because i dial manually from memory, technology is the nemesis of privacy.
@@mestari6289 yes but that confirms my point, What data would be obtained from a phone that is only used to call and receive calls with no banking apps nor social media apps or anything related to my person except the phone number
there is always a way in, nothing is 100% private and if it has software to work can be hacked but the point on hacking is to obtain something of value, it is dumb to steal an empty safe to waste time and energy opening it to get nothing.
Another reason not to use smartphones, use amateur radio like ft8, other digital modes so these companies cant track you, but the FCC and other amateur radio operators can.
@@Ragin.Official Not true, on android 7+ after factory reset is performed the encryption key gets replaced so you cant recover any data that was there before.
@@noThankyou-g5c We’re not saying the USA is perfect, but generally we don’t torture people and/or harvest their organs when they get arrested or detained by the police.
this video is fucking perfect for my digital forensics group project, thank you for being the first place ive found online that actually goes in depth explainin how data is extracted instead of just saying "they connect it to lab equipment and perform physical or logical extraction". even my lecture slides dont come close to this in depth
To prevent hacking, remove half of the battery and pack C4 in the empty space which activates on detection of usb cable being plugged in. Just an idea that seems doable.
Haha
It's a decades old concept. That already have been used.
It doesn't have to be half, C4s are plastic explosives so you can just have enough where it matters like on the SoC and Flash storage.
Why not instead of plugging in a USB.. have a txt sent via another phone
🤣🤣🤣🤣🤣🤣🤣🤣
Discovered a goldmine of information in this channel! Highly technical yet highly enjoyable as well. Keep up the good work!
yep good channel
AI generated voice is well done but you can still tell.
seems real to me. more dynamic than ai
It feels more like ai
@@peppiguebro went bell-are-us for Belarus 😭
@@peppigue 7:43 Listen to the way he says firmware
thought it was just me
criminally underrated channel
Underrated criminal channel
one of my favorite channels rn. don't stop making content !
Glad you like it!
When it comes to the brute force attacks, the best protection is to still use an alphanumeric password and not just some digits as passcode. This increases the time needed to crack from hours to years, giving you enough time to wipe the phone from your online account or simply rendering many data on the phone obsolete over so much time, especially saved login-data for 3rd parties.
I think you need to advertise this channel...
It has good content but it’s not getting out there
I stumbled on this by accident but the content is mind blowing
Thanks! Glad you liked it! We're considering doing some advertisement...
The wider percentage of society can’t understand, process or digest this supremely valuable information. The 95% of social sheep in our population can’t concentrate for long enough to digest this fantastic info . Thank god I’m a proud geek and analytically wired
How does lockdown mode work to prevent unauthorized access via these methods? Always wondered what additional measures are in place to prevent someone from cracking the passcode via cable, etc.
Obviously Apple is pretty secretive about their technology, so it’s speculation. But likely close the APIs and other interfaces, that normally take some data from connections.
Lockdown mode just disables features that are common attack vectors. It's an extreme measure that renders many convince features unusable like system and message notifications and others.
The two most common areas I've seen exploited on iso for remote exploit are the notifications engine and text messages.
Really well explained! I love that you didn't mix up or wrongly interpret the technical data! Makes for a very factual and informative video
Glad you liked it. We definitely lost our minds while we were deep in the technical weeds 🤣
Can't you just block external connections?
@@QueenElsa1999 If you turn on lockdown mode. Otherwise when you plug in it prompts for the pin, so there's some attack surface.
0:19 Shouldn't the emphasis in the name of Belarus be on the last syllable?
Seriously, I completely understand why it is almost impossible to write a complex software like a web browser without vulnerabilities. But WHY it's so hard to write 2-4Kb boot ROM or TPM firmware without CRITICAL vulnerability?? I wish one day Apple/Qualcomm hires someone from industrial or aerospace sector just to write a simple and secure boot firmware for their new chip.
Successful attack to a "data at rest" makes me mad
Crypto is hard, and anyway jailbreaking is good (just it should require user authorisation)
They're in on it
@teknixstuff Sorry, but good for what?
Honest question, not trying to mess with ya 🤙
Phenomenal explanation on every topic🎉
Concise and informative. Thank you!
Glad it was helpful!
@@realtimecyberis the voiceover AI?
@@itssayaboilastname9195 didn't pass the turning test?
Where can I find this program? Thank you very much.
Facebook marketplace normally bro
Cold boot attacks, basically they are able to extract encryption keys that are locally stored in the memory before the storage is booted. Once those keys are obtained they can easily decrypt the data. They also imitate the DNS of apple servers
So how are people receiving nfa in cases related images apparently that were on the phone? How weren't they recovered? What makes them unrecoverabke
how does it look like on the legal side of life given the software is the property of manufacturer? can these companies not be sued by Apple or have the tools banned?
Not sure. We’re not attorneys.
You are free to run whatever software you want on devices you own as long as you are not distributing copyrighted material. LE bypass the consent issue with warrants or the unconstitutional but yet still in law FISA system.
BELARUS MENTIONED!!!!!! 🎉🎉🎉🎉🎉🎉
I'm sure it's hard to crack an iPhone if you scratch off a few of the pins on the lightning cable. Did you find the ones that are just for charging I think you'll be good. Or you could use NFC charging or qi charging whatever the hell it's called
Wireless charging, qi charging, etc. I don't know how many people still remember qi unless you were an earlier adaopter of this tech.NFC is more about data.
This was a good video! I cannot tell if the voice was AI or not though.
Passed the turing test?
@@realtimecyber Idk. Lol.
AI 💯
ICLOUD LOCKED iPhone 13 pro max UNLOCKING information I was looking for, would the IPhone 13 pro max with ICLOUD LOCK be useable again if the LOGIC-BOARD or MOTHER-BOARD was replaced with a UNLOCKED BOARD, I would really appreciate any help thankyou. Great video thankyou.
With AI emerging this is going to be a growing cat and mouse game
could you tell this video's voice is ai-generated?
@@king_james_official wow I listened again so right
The new iphone se 2nd gen and 3rd gens are not exploitable to the same as the iPhone 6 - X exploit because they have newer A series processors when those older jailbreakble and exploitable phones have older a8 - a11 processors a12 and newer patched it
If it is jailbreakble it is hackable. A fake OS running fake Apps.
@@iRelevant.47.system.boycott yup
So if police have my iphone 11 max pro, i refused to give passcode will they get in? Plus for some reason they told me to shut the phone down when i handed it over to them, meaning the face ID wont work.
@@KingKhan20000 as far as I know with most tools no if its updated because that phone is not checkmate jailbreakable and turning it off encrypts the data
@@oHacks. Not sure if its updated I think the ios is still the 2020 one. But I was told to shut it down in the house then they took it after so idk...
Are these devices availabke one aliexpess yet?
Any suggestions to cracking the passcode on my Iphone XR? I dont have the apple id and it wasnt my phone. We met at walmart and I checked out the phone before buying it. I didnt bring cash so I went inside walmart to use an atm. He gave me a different phone when I paid him. It looked the same, same color and everything except this one has a passcode and the other one didnt. Or maybe he put a passcode on it while i was in the store. Yes, im an idiot for not checking it again before I gave him my money. I dont mind paying for a program to get my phone unlocked but nothing expensive because I can buy a new phone if thats the case.
You can try 3U tools or Eelphone iPhone Unlock. I never tried either. If it is a locked phone, it might be blacklisted anyway.
@@snoopdogie187He can’t do nothing because USB Debugging isn’t enabled for his PC anyway
I guess if you had something to hide a simple solution might be to drill a little hole through the USB interface chip and rely instead on wireless charging for the phone. Not perfect but would make life a lot more difficult.
You could of course booby trap the device to short the battery out if remote wipe was instigated, a handshake wasn’t received for a few days or on 10 failed unlocks.
Can a regular civilian buy this?
It is unlikely unless you're a security researching firm and have millions of dollars since the exploits they utilize are very valuable and are mostly illegal unless you have consent from the owner of the device.
No.
No for shure
Thanks , its highly detailed❤❤❤
Great work on this one. 👍
Thanks! Glad you liked it!
Wanna see them try this on a 14 Pro max or 15 pro max/ by the time they crack these there would be iPhone 21 and 22 pro max already out
An unpatchable side channel attack vulnerability (analyzing behavior of the chips) that allows extraction of secret keys was actually just discovered in M1 macs. Those are only a few years old. So never say never.
@@realtimecyber Never said never but i mean for now its not possible. there is always a work around tho as innovation is daily so
Se puede hacer estos ah un 12 pro Max ?
If you can’t jailbreak a iPhone and lower the security it will be very hard to hack. As you would either need that PIN number apple sends to access the phone. 2FA.
But I believe the ones that CAN be jailbroken are easier to hack. The others that can’t you’ll probably need physical access to either usb attack or brute force.
Were can I buy this tool
Nearest FBI office if in the US.
I just wanna point out when you start your iPhone and type in the password for the first time then all of this is possible! But if you were going about your day and let’s just say you get arrested, hold down the power button where you can slide to shut your iPhone off. Once you do that encrypt your entire phone and they can’t pull this off.
So yeah, this is possible , but not if you just turn your phone on for the first time and have it entered your password!
Also, if your password is a couple of digits , you might wanna rethink your password! Alphanumerically is better! Especially if you’re using for example English letters and Russian Cyrillic along with numbers and special characters! I’m just saying if you’re never in that situation someone’s gonna come back to you really pissed off wanting you to enter your password backing it up with a few threats!
But I can guarantee you it will be the greatest feeling ever when you’re able to tell them no, and there’s shit they can do about it!
You lost me after about 3 minutes but I continued watching until the end because it was still interesting even if I had no clue what the hell you were talking about. Hey, I am an old truck mechanic, not a digital expert.
But it did make me wonder; it appears that in some cases the phone might be damaged to get the data out of it. So what happens when nothing useful was recovered and the person that owned the phone was completely innocent? Does the FBI (or whoever) say "sucks to be you"
I suppose an innocent person might willingly let the FBI look through their phone if they had nothing to hide so that all of this wouldn't be necessary.
Then again, when my sister in law took her own life a couple years ago, my wife wanted to look through her iPhone to see what was going on in her life during her last days. Without an unlock code, we were out of luck and certainly couldn't do anything like this. Perhaps its better that we didn't know. My wife had endured enough anguish having to bury her sister. No reason to add fuel to the fire.
"an innocent person might willingly let the FBI look through their phone if they had nothing to hide"
The FBI will make sure to plant something that you'll want to hide, so that they can put you in the slammer, and look like the heroes with zero effort on their part. 💀
@@vlc-cosplayernothing to hide and nothing to share. I don't want control freaks or government glowies to have access to my data.
Taking away normal people's privacy will not reduce crime in any way. The criminals will just continue to use secure anonymous systems. Taking away peoples privacy serves one purpose to allow the government to control and suppress people the deem a threat to their agenda.
Love your content
Thanks! Glad you like it.
AI voice is really impressive. When the little mistakes are taken care off, the real problems will start.
so would the latest iphone and latest software update be impenetrable?
Unclear. They are definitely more secure. But some claim to be able to crack them.
Just don't do crimes, specifically on your phone
@@tamirrothschild”crime” is just whatever what power decides, next week you could be guilty of a “crime” that you do everyday on your phone right now.
@@SensibleCentristalso some schools use these services. Phones of students could easily unkocked and the data collected.
@@SensibleCentrist well i do sell crack on my phone rn hope that no illegal next week, but most staff you can do on your phone are staff you can do properly on a computer with tor, that way i like to not sell crack
Wow pretty cool channel
Thanks.
It's an AI content farm
Can you do one about
What data police can get from whats app
very interesting
The poorly named Patriot Act opened the door for this.
they dont actually crack the encryption
So iPhone 11 with iOS 16.7.2 can’t be brute password hack
The editing makes the video hard to follow. There are a lot of useless cuts and random gifs that don't have anything to do with the context.
Mrs Richards: "I paid for a room with a view !"
Basil: (pointing to the lovely view) "That is Torquay, Madam ."
Mrs Richards: "It's not good enough!"
Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window ? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically across the plains?..."
Mrs Richards: "Don't be silly! I expect to be able to see the sea!"
Basil: "You can see the sea, it's over there between the land and the sky."
Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction."
Basil: "Why?! Because Krakatoa's not erupting at the moment ?"
Those files are not stolen. They are included in itunes.
Its against their terms of service reverse engineer them, or use them for things like this.
@@realtimecyber as someone who has a touch 1, touch 2, ufed4pc, and physical analyzer I can tell you now the information you posted is missing critical details. ITunes is required to be installed prior to you installing the Ufed Touch software. Its not reverse engineering their code. Its using the stock OEM files and the proof of it is that the digital certificate was untampered. The screenshot only proves the files are in the correct directories after iTunes and Apple Application Services are installed.
@@realtimecyber against terms of service or not they are files on your machine and you are free to do whatever you want with them as long as you're not distributing copyrighted material. You can claim cryptographic keys are copyrighted and are properties of apple so distributing them would be illegal but the mere act of reverse engineering is not.
Still if the tool extracts those keys at runtime on the device itself then there is nothing apple can do. They cannot use legal means to stop you from running code on your own devices.
@@ImperiumLibertas They are distributing the material; cellebrite is a publically traded company that sells devices to crack iphones.
Apparently, students at the HS I work at unlock phones for $5, wouldn't surprise me if they can do the new iPhones
Awesome vid
Cool vid. Thanks.
so can i buy cheap locked phones or not?
They use a wire mesh and radio signals ran across the surface that is made wet. They first access the Camara than charging system and finally the whole phone.
Are you saying they use electromagnetic fields to power certain parts of the device independently? If that is even remotely true that is insanity cool.
Do you have a source for that I can read up on?
I MUST RE-WATCH THIS VIDEO!😀😎👍
What the fuck is this? Actual good info in an AI voice video?!? 👍
What about iPhone 15 Pro Max
This makes me want to use a dumb phone or tell my family they can get thier amateur radio license and continue using my tablet and laptop.
This would be great for insomniacs.
A LOT OF INFO! now how about enterprise iphones that are remotely managed? i didn't hear anything about that? At work here they say not hackable LOL
For the most part a MDM cannot prevent most of this, the hardware vulnerabilities still exist, it could enable some of the newer protections, and possibly reduce the attack surface by disabling certain functionality. It could also remotely wipe a device before its cracked, assuming the device isnt put into a faraday pouch which is common practice before cracking a seized device.
If they haven’t already, Apple needs to buy this and work against it.
Am a fed. Can confirm.
Interesting
Good vibes
The FBI doesn't crack them. Apple gives them access in exchange for government favors.
You may be right,in my country India, government had purchased Israel hacking softwares secretly, still they had to request Apple for unlocking an arrested opposition leader's iphone which Apple thankfully denied.
So can you unlock a 13 pro w/o the password or not?
government program
Stop stealing peoples phones 😠😠😠😠😊
Stop stealing peoples phones 😠😠😠😠😠😠
CIA backdoors. They can’t let that opportunity go. Millions of people use iPhones globally.
Why window. Where are my Linux advocate 😂😂😂
Because no iTunes on Linux
Apple could stop them getting in if they WANTED TO!
I doubt it, if they don’t know what they’re up against then they can’t fight it
If Apple did so, this would be a highly socially irresponsible move - since 9/11, we have to accept the reality of the fact that our digital communications must be closely monitored - some countries are even banning VPN’s and antivirus and they closely monitor and restrict their mobile phone and internet networks, where in some cases, the possession of certain devices is illegal in certain countries
Nope, the companies don't tell aple about the vulnerabilities for obvious reasons so they can't fix what they don't know about.
@@JC-kk4ph that’s what there business model is
Not necessarily the case, remember a few years back when that muslim couple was killed in a chase for some terrorist shooting or whatever, I believe it was San Francisco or at least western us...
Anyway, the feds first asked Apple to open the phones and Apple said absolutely not...(owners are dead BTW and feds saying there could be links to other terrorists on the phones etc...) well it goes to court and Apple is still refusing on the basis of customer trust and they're not violating that... period.
All the sudden us stops asking or fighting it... out of the news...few weeks later comes out Isreal intelligence offered to open them for the us.... and I'm sure exchanged some techniques about it...
Isreal is the bleeding edge of weaponized cyberwarfare and militarized hacking at all levels necessary to their needs.
I understand the purpose but what if this falls into the wrong hands? Also, suppose you are writing a novel or poetry.wouldn't that allow anyone to steal your work?… So... Is it why the EU is forcing apple to use USB-C?
No the plug standard does not determine the security of the system. The security is mostly done on chips on the motherboard like the trusted processing unit (TPU) and the central processing unit (CPU). The plug is just the standard way data goes in and out but doesn't determine what data goes in or out.
The USB-C thing is about creating a common charging standard between manufacturers. To reduce electronic waste.
This is already in the wrong hands
These commercials are getting out of hand
Makes sense now why Apple wants to go wireless
Wireless will likely have similar vulnerabilities
Less than ethical regimes in Russia? What a frucking laugh coming from a sceptic tank.
I wish all luck possible to the one that dare try to hack my nokia 3310 i do not even save contacts because i dial manually from memory, technology is the nemesis of privacy.
It uses GSM which can be broken by anyone with some knowledge.
@@mestari6289 yes but that confirms my point, What data would be obtained from a phone that is only used to call and receive calls with no banking apps nor social media apps or anything related to my person except the phone number
there is always a way in, nothing is 100% private and if it has software to work can be hacked but the point on hacking is to obtain something of value, it is dumb to steal an empty safe to waste time and energy opening it to get nothing.
Or just clear your phone thru iCloud remotely once they are in possession of the phone 😂
artificial narrator
Didn't pass the turing test?
My friend was fully convinced no one can hack an iPhone and view data😂😂😂😂😂😂😂😂
Share this video🤣
now you can say no one who gives enough of a shit about him or doesn't have the money can hack his iPhone
Who the fuck uses iPhone 5 anyway 😂
If Signal Team can get it Apple is definitely can get them
Oh my god, I know more about computers than the average ~20 year old but I had not idea how complex computers and smartphones really are 😳😳😳
Smartphones are computers, just "pocket sized".
I doubt that android phones have a similar security
Another reason not to use smartphones, use amateur radio like ft8, other digital modes so these companies cant track you, but the FCC and other amateur radio operators can.
Install software thats wipes your phone if a data cable is connected.
good luck charging
And data is never really wiped until it’s over written
Yea, just the pointer is deleted. @@Ragin.Official
@@Ragin.Official Not true, on android 7+ after factory reset is performed the encryption key gets replaced so you cant recover any data that was there before.
Geesh the longest scene I’ve seen were 4 seconds
Disappointed
LOL listing the US then saying less than "ethical regimes" and then listing a bunch of countries, you act like the US is ethical.
the X in iphone X is pronounced 10. its roman number
The hiccups of using TTS
i understood nothing you said lol
Can apple sue?
Pretty sure they already have.
I started tuning out when I heard the artificial voice and poor grammar which highlights them so easily.
Of course cellebrite is an Israel based company
ty for telling us it a boycott product
Will Uk police get into an 11 max pro?
yeah
@@will00709 Do they try harder for certain crimes?
mate unless the crime poses a national threat they won’t bother.
@@Meljoseph-dl3eb Really? So if its an 11 max pro that got shut down before giving to them... they wont bother to get in?
@@KingKhan20000 what offence was the phone seized for?
if youre phone could have removable storage it be safe after selling hahah
the AI voice is soooo cursed
i am scared of celebrite now
I USING z3x A 10+years.. tf you crackinbg nabout XD
Something to keep in mind. If you have the time to watch this video, you are not important enough to have to worry about this.
If you are a criminal and have one of the older vulnerable phones, any police department can crack your phone with a warrant.
You lost me at implying that non western players are non ethical by default, as if the west is...
0:15 whats with the implication that our regime in the US are ethical lol?
@@noThankyou-g5c We’re not saying the USA is perfect, but generally we don’t torture people and/or harvest their organs when they get arrested or detained by the police.
@@realtimecyber oh yes mate, the United States has never tortured people in its history.
@@realtimecyber do u know what guantanamo is?
Criminals in uniform.
If you are referring to the U.S they do this with a warrant and/or probable cause.
They can’t gain any access passed iPhone 11 Pro Max.
Crime wasnt big enough mb :)
@@Kawasakibikerfreak Equipment isn’t good enough 😘
ios 🥳
This is the stuff ordinary people don’t think about
Useless industries …. 9:01
Moxiemarlinspike says this is boll#x
Please cite.