top | item 9176602

(no title)

pasta_2 | 11 years ago

A great ad for Apple's security.

discuss

order

IBM|11 years ago

I agree. When the intelligence community has to resort to this, I think the everyman is ok:

>At the 2011 Jamboree conference, there were two separate presentations on hacking the GID key on Apple’s processors. One was focused on non-invasively obtaining it by studying the electromagnetic emissions of — and the amount of power used by — the iPhone’s processor while encryption is being performed. Careful analysis of that information could be used to extract the encryption key. Such a tactic is known as a “side channel” attack. The second focused on a “method to physically extract the GID key.”