On Monday, much to everyone's surprise asked the FBI to cancel upcoming court hearing where he was supposed to appear against Apple, after which wanted to jailbreak his iPhone. The FBI literally backed out at the last minute, allegedly because they found a company that would unlock his iPhone without Apple's assistance.
The US Department of Justice, under which the FBI falls, and Apple were to appear in court on Tuesday, just a few tens of hours after the California company presented new Products. But finally, it was during this event that the FBI asked the court to cancel the stand.
At the last minute, investigators are said to have obtained from an outside source a method to get into the secure iPhone 5C found in the San Bernardino killing terrorist, even without Apple's assistance. The FBI did not name its source, but it gradually surfaced that it would probably be the Israeli company Cellbrite, which deals with mobile forensic software.
According to industry experts who are working on the case and who they rely on they recall Reuters or Ynet, Cellebrite is supposed to help unlock this iPhone, which is secured by a passcode and automatically wipes if the passcode is entered incorrectly ten times.
The cooperation of Cellebrite and the FBI would not be too surprising, since in 2013 both parties signed a contract under which the Israeli company helps with the extraction of data from mobile devices. And that's exactly what the FBI needs now, even in the closely watched case against Apple. During it, the investigators were contacted by many subjects who wanted to help with breaking the code, but none succeeded.
It wasn't until Cellebrite showed the FBI on Sunday that it had a method by which it could retrieve data from a secure phone. That is why the request to cancel the court hearing came so late. According to the FBI documents, the UFED system used by Cellebrite supports all the major technologies in use, so it should also make its way to iPhones, i.e. iOS.
Experts speculate that Cellebrite will attempt to crack the code with NAND mirroring, which, among other things, copies the device's entire memory so that it can be loaded back into it once the device is wiped after ten failed attempts. It is not yet clear how the whole situation will develop, or whether the FBI will actually be able to bypass the new security method. However, the Ministry of Justice should inform the court about the progress by the beginning of next month at the latest.
As they say: There's a guy for every guy.
I have the impression that if it was such a strumpet, it would have been finished a long time ago. It rather gives me the impression that the FBI was scared of the court, around which Apple masterfully managed to create a decent hype. Of course, precedent works both ways, and if the FBI were to lose, it would mean it would be stuck with similarly moronic requests for a long time.
The drowning man is clutching at straws and will probably try all the options first, and maybe if they "accidentally" wipe their iPhone, it will allow them to back out of the whole affair with honor...