Skip to main content

Company which accessed San Bernardino iPhone 5c ‘optimistic’ it can also access iPhone 6

Cellebrite, the company widely believed to have accessed the San Bernardino iPhone for the FBI, is reportedly ‘optimistic’ that it will also be able to access a locked iPhone 6.

CNN reports that Italian architect Leonardo Fabbretti met with the company last week to see whether it could help gain access to his dead son’s iPhone. Before his death from bone cancer, 13-year-old Dama Fabbretti had added his father’s thumbprint to allow him access – but the phone required the passcode after a restart, and his father doesn’t know the code.

Apple had told him it was impossible to access the iPhone without the passcode, but Fabretti told CNN that Cellebrite has already made progress …

“I just came back from their office in northern Italy. The meeting went well. They were able to download the directories with the iPhone’s content, but there is still work to be done in order to access the files,” Fabbretti said.

Those files contain the months of photos and conversations the dad so desperately wants to see, including a handful of videos taken three days before his son died.

Fabbretti said that the company had told him it was ‘optimistic’ about its chances of accessing the files. Both Apple and Cellebrite refused to comment on the case.

The FBI last week advised that the method used to access the San Bernardino phone does not work on the iPhone 5s or later, which appeared to confirm earlier speculation that the passcode bypass would not work on models with a Secure Enclave. If Cellebrite has a new method that successfully breaks into the iPhone 6, that will leave Apple with further work to do to secure future iPhones.

FTC: We use income earning auto affiliate links. More.

You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

Comments

  1. applenthusiast - 8 years ago

    Next week: “FBI buys Cellebrite”

    • PhilBoogie - 8 years ago

      lol. Yeah, The Federal Bureau of iPhones sure seems to be a regular customer¡

      • 89p13 - 8 years ago

        AND – Our (USA Citizens) Taxpayer $$$ are paying for that!

    • standardpull - 8 years ago

      Yeah, except then Cellebrite employees would then land on the government payroll, where they’d immediately quit due to lousy pay. And so the FBI would end up with nothing.

    • kkk123kkk123kkk - 8 years ago

      Or next week “Apple buys Cellebrite”. (or Sun Corporation which own Cellebrite)

  2. PhilBoogie - 8 years ago

    Wouldn’t have expected any other statement than this one that puts them in a “positive light”. Pity they’re so vocal about it, but hay, it’s marketing that sells.

  3. viciosodiego - 8 years ago

    Go on then.
    Try and hack the security enclave.

  4. LOL!!! I’m optimistic they can’t. The reason they got in the last one was because of 32bit arch. This will be much different.

    • Randy March - 8 years ago

      No, overflow wasn’t the vulnerability in the 5C. They just reset the attempt counter to zero in NVRAM with every attempt or so, AFAIK.

      The 5S and other Touch ID-equipped devices have the Secure Enclave which stores the replay counter in a separate memory, with possibly some cryptography somewhere along the way.

    • srgmac - 8 years ago

      I’m pretty sure Randy is right. Snowden said the easiest method would be to do NVRAM injection to fake the retry counter.

  5. 89p13 - 8 years ago

    Well – for one, I feel better about Cellebrite having the technology and continuing to charge BIG $$$ to unlock an iPhone rather than the FBI having the GovtOS and having that code leak out so that anyone with the GovtOS can crack an iPhone.

    If it costs $$$$ – that means someone really HAS to want to get into my iOS device!

    YMMV

  6. Matthew Fox - 8 years ago

    i’m optimistic they do not have to, because they overlooked iCloud or iTunes backups.

    • taoprophet420 - 8 years ago

      They had access to iCloud backups in San Bernardino, they just wanted access to the latest backup. It is why it is highly unlikely any information was found in the phone.

      • transamken - 8 years ago

        If they found anything of relevance they would be rubbing it in our faces 24/7 in the media.

      • r00fus1 - 8 years ago

        So it was a manufactured fishing expedition to try to coerce Apple to do the Government’s (and more importantly, the Governments string-pullers) work?

  7. Dave Howarth - 8 years ago

    So I’m probably just missing something here, but if they’ve gotten “some data” then doesn’t that mean they’re not just brute forcing the passcode? If you’re brute forcing the code then you would have nothing until you get the code, then you’d have everything. There’s no in between unless they’re using a different method…. Unless I’m missing something (which I assume I am)

    • Jon C (@JonCBK) - 8 years ago

      I think they are copying data directly off the memory. So it might being copied in its encrypted form.

      I also do not mind that difficult and expensive encryption breaks exist for consumer devices. As long as it takes some serious amount of time and expertise it addresses the main issue of bad government action. Personally I’m not interesting enough of a target for anyone to want to do that. And the bad government actors of the world won’t be able to do full monitoring or spot monitoring at boarder crossings with this hack method.

      • strich9 - 8 years ago

        It may be difficult now. But in 3 months expect a device on Amazon that’ll work.

  8. srgmac - 8 years ago

    What about the lock screen bypasses? I know there are some that work from boot even. There’s also another exploit going around that is a GUI bug that appears to give unlimited tries without a retry counter even on devices with Secure Enclaves.

    • John Smith - 8 years ago

      Yeah – access to Apple devices is either by highly complex and expensive forensics firms … or alternatively via a YouTube video of the latest ‘lock’ screen failure.

      • Ben Lovejoy - 8 years ago

        Those videos are fakes – they are simply using Touch ID to unlock the phone.

  9. A father not respecting the privacy of his dead son, way to go…

    • Ben Lovejoy - 8 years ago

      “Before his death from bone cancer, 13-year-old Dama Fabbretti had added his father’s thumbprint to allow him access – but the phone required the passcode after a restart, and his father doesn’t know the code.”

  10. John Smith - 8 years ago

    Once again demonstrates the unsatisfactory situation Apple has created:

    * The legitimate heir to a dead person’s property cannot access it by normal means.

    * Access being gained by backdoor means, the nature of which are not known, and are not subject to legal control.

    Much better if Apple did what responsible IT providers do – provide a secure means for Apple themselves to access locked devices and provide disclosure (only) on receipt of a court order.

  11. pretsky - 8 years ago

    Good. No chance for Apple to demagogue the issue.

Author

Avatar for Ben Lovejoy Ben Lovejoy

Ben Lovejoy is a British technology writer and EU Editor for 9to5Mac. He’s known for his op-eds and diary pieces, exploring his experience of Apple products over time, for a more rounded review. He also writes fiction, with two technothriller novels, a couple of SF shorts and a rom-com!


Ben Lovejoy's favorite gear