Close ad

On Monday, much to everyone's surprise asked the FBI to cancel upcoming court hearing where he was supposed to appear against Apple, after which wanted to jailbreak his iPhone. The FBI literally backed out at the last minute, allegedly because they found a company that would unlock his iPhone without Apple's assistance.

The US Department of Justice, under which the FBI falls, and Apple were to appear in court on Tuesday, just a few tens of hours after the California company presented new Products. But finally, it was during this event that the FBI asked the court to cancel the stand.

At the last minute, investigators are said to have obtained from an outside source a method to get into the secure iPhone 5C found in the San Bernardino killing terrorist, even without Apple's assistance. The FBI did not name its source, but it gradually surfaced that it would probably be the Israeli company Cellbrite, which deals with mobile forensic software.

According to industry experts who are working on the case and who they rely on they recall Reuters or Ynet, Cellebrite is supposed to help unlock this iPhone, which is secured by a passcode and automatically wipes if the passcode is entered incorrectly ten times.

The cooperation of Cellebrite and the FBI would not be too surprising, since in 2013 both parties signed a contract under which the Israeli company helps with the extraction of data from mobile devices. And that's exactly what the FBI needs now, even in the closely watched case against Apple. During it, the investigators were contacted by many subjects who wanted to help with breaking the code, but none succeeded.

It wasn't until Cellebrite showed the FBI on Sunday that it had a method by which it could retrieve data from a secure phone. That is why the request to cancel the court hearing came so late. According to the FBI documents, the UFED system used by Cellebrite supports all the major technologies in use, so it should also make its way to iPhones, i.e. iOS.

Experts speculate that Cellebrite will attempt to crack the code with NAND mirroring, which, among other things, copies the device's entire memory so that it can be loaded back into it once the device is wiped after ten failed attempts. It is not yet clear how the whole situation will develop, or whether the FBI will actually be able to bypass the new security method. However, the Ministry of Justice should inform the court about the progress by the beginning of next month at the latest.

Source: The Verge
.