SlideShare a Scribd company logo
Dept. of Computer Sc. & Engineering
RTU, Kota
Seminar on
iOS Encryption
&
Apple v/s FBI
Contents
Terrorist attack in San Bernardino
Investigations leading to terrorist’s iPhone 5C
Demands of FBI
Reaction of Apple Inc.
Introduction to iOS security
Result of the court case
Conclusion
Terrorist attack in San Bernardino
• On December 2, 2015, 14 killed and 22 injured at Inland Regional
Center, SB, California.
• The perpetrators were Syed Rizwan Farook and Tashfeen Malik
who targeted a public event.
• FBI was unable to unlock the recovered iPhone 5C with iOS 9
operating system issued to its employee, Syed, due to its advanced
security features.
Investigations leading to terrorist’s iPhone
5C
• Device's encryption technology was enabled, preventing the FBI from
accessing its contents without knowing the device's 4 or 6 digit PIN.
NBC News reporting on it:
“In a 40-page filing, the U.S. Attorney's Office in Los Angeles argued that it
needed Apple to help it find the password and access "relevant, critical data"
on the locked cellphone of Syed Farook, who with his wife Tashfeen Malik
murdered 14 people in San Bernardino, California on December 2.”
Demands of FBI
• Apple should create a unique version of iOS that would bypass
security protections on the iPhone Lock screen.
• It would also add a completely new capability so that passcode tries
could be entered electronically.
• Disabling the feature that wipes the data on the phone after 10
incorrect tries at entering a password.
• Thus making it easier to unlock an iPhone by “brute force,” trying
millions of combinations without risking the deletion of the data.
Reaction of Apple Inc.
• Passcode lock & manual entry is the heart of the safeguards.
• Unlocking one iPhone would be the equivalent of a master key,
capable of opening hundreds of millions of locks.
• Strongest suggestions offered was to pair the phone to a previously
joined network, allowing FBI to back up the phone and get the data.
• The iPhone couldn’t access iCloud services due to change in
password by FBI.
• Handed over all the data it had, including a backup of the iPhone in
question.
Introduction to iOS security
• Security kept at core, analyzing security hazards
of the desktop environment.
• Every iOS device combines software, hardware,
and services designed to work together for
maximum security.
• After iOS 7, Apple decided to protect much more
of the data under the user's passcode.
• Starting with iOS 8, all of the data on an iPhone is
encrypted on disk with extremely strong
encryption.
Security Classifications
System security
Encryption and data protection
App security
Network security
Apple Pay
Internet services
Device controls
Privacy controls
.
Security architecture diagram
of iOS provides a visual
overview of the different
technologies
System security
• Boot-up process, software updates and Secure
Enclave
• Secure boot chain
• System Software Authorization
• Secure Enclave
Encryption and data protection
• Hardware security features
• File Data Protection
• Passcodes
App security
• App code signing
• Runtime process security
• Extensions
• App Groups
• Data Protection in apps
Network security
• TLS
• VPN
• WiFi
• Bluetooth
Apple Pay
• Apple Pay components
oSecure Element
oNFC controller
oWallet
oSecure Enclave
oApple Pay Servers
Internet services
• Apple ID
• iMessage
Device controls
• Passcode protection
• iOS pairing model
• Configuration enforcement
• Mobile device management (MDM)
• Device restrictions
• Remote wipe
• Find My iPhone and Activation Lock
Privacy controls
• Location Services
• Access to personal data
• Contacts
• Microphone
• Calendars
• Camera
• Reminders
Result of the court case
“The government has now successfully accessed the data stored
on Farook’s iPhone and therefore no longer requires the
assistance from Apple Inc. mandated by Court’s Order” the
filing reads.
• The filing doesn’t elaborate on the method used by FBI.
• Sources claim for relations between FBI and a 3rd party, probably an
Israeli firm, Cellebrite, after whose help FBI withdrew the case.
Conclusion
“This lawsuit may be over, but the
Constitutional and privacy questions it
raised are not”
Congressman Darrell Issa (R-Calif.), who had criticized the
Justice Department's legal effort against Apple, said in a
statement.
Thank You!

More Related Content

What's hot

Android Security
Android SecurityAndroid Security
Android Security
Suminda Gunawardhana
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM Workshop
Splunk
 
Mobile operating system..
Mobile operating system..Mobile operating system..
Mobile operating system..
Aashish Uppal
 
Android security
Android securityAndroid security
Android security
Mobile Rtpl
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
Richa Dewani
 
Ios seminar
Ios seminarIos seminar
Ios seminar
Kurikkal Ashique
 
iOS Security
iOS SecurityiOS Security
iOS Security
Bruno Rocha
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Cellebrite
 
GlassFish in Production Environments
GlassFish in Production EnvironmentsGlassFish in Production Environments
GlassFish in Production Environments
Bruno Borges
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
 
Android Application Development
Android Application DevelopmentAndroid Application Development
Android Application Development
Benny Skogberg
 
Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
Bilal Mirza
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
PrasadThorat23
 
Hacking and Securing iOS Applications
Hacking and Securing iOS ApplicationsHacking and Securing iOS Applications
Hacking and Securing iOS Applications
n|u - The Open Security Community
 
Icloud by Apple doc
Icloud  by Apple docIcloud  by Apple doc
Icloud by Apple doc
Kokonda Nikhil Kumar
 
Android ppt
Android pptAndroid ppt
Android ppt
Ansh Singh
 
android-tutorial-for-beginner
android-tutorial-for-beginnerandroid-tutorial-for-beginner
android-tutorial-for-beginner
Ajailal Parackal
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
anupriti
 
iOS Operating System
iOS Operating SystemiOS Operating System
iOS Operating System
Jawaher Abdulwahab Fadhil
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
Eryk Budi Pratama
 

What's hot (20)

Android Security
Android SecurityAndroid Security
Android Security
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM Workshop
 
Mobile operating system..
Mobile operating system..Mobile operating system..
Mobile operating system..
 
Android security
Android securityAndroid security
Android security
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
Ios seminar
Ios seminarIos seminar
Ios seminar
 
iOS Security
iOS SecurityiOS Security
iOS Security
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
 
GlassFish in Production Environments
GlassFish in Production EnvironmentsGlassFish in Production Environments
GlassFish in Production Environments
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
Android Application Development
Android Application DevelopmentAndroid Application Development
Android Application Development
 
Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Hacking and Securing iOS Applications
Hacking and Securing iOS ApplicationsHacking and Securing iOS Applications
Hacking and Securing iOS Applications
 
Icloud by Apple doc
Icloud  by Apple docIcloud  by Apple doc
Icloud by Apple doc
 
Android ppt
Android pptAndroid ppt
Android ppt
 
android-tutorial-for-beginner
android-tutorial-for-beginnerandroid-tutorial-for-beginner
android-tutorial-for-beginner
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
iOS Operating System
iOS Operating SystemiOS Operating System
iOS Operating System
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
 

Similar to iOS Security and Encryption

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
Mariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
Dario Caliendo
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
Birju Tank
 
itmsday1.pptx
itmsday1.pptxitmsday1.pptx
itmsday1.pptx
santoshmohanthy2
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
Tom Eston
 
iOS Forensics
iOS Forensics iOS Forensics
iOS Forensics
Tjylen Veselyj
 
File000092
File000092File000092
File000092
Desmond Devendran
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
Frances Coronel
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
Sophos Benelux
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
HaniAbdallah4
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?
Reality Net System Solutions
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
Vince Verbeke
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
Moldova ICT Summit
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
Cellebrite
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
FFRI, Inc.
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
Ekankita Agrawalla
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 

Similar to iOS Security and Encryption (20)

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
 
itmsday1.pptx
itmsday1.pptxitmsday1.pptx
itmsday1.pptx
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
iOS Forensics
iOS Forensics iOS Forensics
iOS Forensics
 
File000092
File000092File000092
File000092
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?iOS Forensics: where are we now and what are we missing?
iOS Forensics: where are we now and what are we missing?
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
 
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 

iOS Security and Encryption

  • 1. Dept. of Computer Sc. & Engineering RTU, Kota Seminar on iOS Encryption & Apple v/s FBI
  • 2.
  • 3. Contents Terrorist attack in San Bernardino Investigations leading to terrorist’s iPhone 5C Demands of FBI Reaction of Apple Inc. Introduction to iOS security Result of the court case Conclusion
  • 4. Terrorist attack in San Bernardino • On December 2, 2015, 14 killed and 22 injured at Inland Regional Center, SB, California. • The perpetrators were Syed Rizwan Farook and Tashfeen Malik who targeted a public event. • FBI was unable to unlock the recovered iPhone 5C with iOS 9 operating system issued to its employee, Syed, due to its advanced security features.
  • 5. Investigations leading to terrorist’s iPhone 5C • Device's encryption technology was enabled, preventing the FBI from accessing its contents without knowing the device's 4 or 6 digit PIN. NBC News reporting on it: “In a 40-page filing, the U.S. Attorney's Office in Los Angeles argued that it needed Apple to help it find the password and access "relevant, critical data" on the locked cellphone of Syed Farook, who with his wife Tashfeen Malik murdered 14 people in San Bernardino, California on December 2.”
  • 6. Demands of FBI • Apple should create a unique version of iOS that would bypass security protections on the iPhone Lock screen. • It would also add a completely new capability so that passcode tries could be entered electronically. • Disabling the feature that wipes the data on the phone after 10 incorrect tries at entering a password. • Thus making it easier to unlock an iPhone by “brute force,” trying millions of combinations without risking the deletion of the data.
  • 7. Reaction of Apple Inc. • Passcode lock & manual entry is the heart of the safeguards. • Unlocking one iPhone would be the equivalent of a master key, capable of opening hundreds of millions of locks. • Strongest suggestions offered was to pair the phone to a previously joined network, allowing FBI to back up the phone and get the data. • The iPhone couldn’t access iCloud services due to change in password by FBI. • Handed over all the data it had, including a backup of the iPhone in question.
  • 8. Introduction to iOS security • Security kept at core, analyzing security hazards of the desktop environment. • Every iOS device combines software, hardware, and services designed to work together for maximum security. • After iOS 7, Apple decided to protect much more of the data under the user's passcode. • Starting with iOS 8, all of the data on an iPhone is encrypted on disk with extremely strong encryption.
  • 9. Security Classifications System security Encryption and data protection App security Network security Apple Pay Internet services Device controls Privacy controls
  • 10. . Security architecture diagram of iOS provides a visual overview of the different technologies
  • 11. System security • Boot-up process, software updates and Secure Enclave • Secure boot chain • System Software Authorization • Secure Enclave
  • 12. Encryption and data protection • Hardware security features • File Data Protection • Passcodes
  • 13. App security • App code signing • Runtime process security • Extensions • App Groups • Data Protection in apps
  • 14. Network security • TLS • VPN • WiFi • Bluetooth
  • 15. Apple Pay • Apple Pay components oSecure Element oNFC controller oWallet oSecure Enclave oApple Pay Servers
  • 16. Internet services • Apple ID • iMessage
  • 17. Device controls • Passcode protection • iOS pairing model • Configuration enforcement • Mobile device management (MDM) • Device restrictions • Remote wipe • Find My iPhone and Activation Lock
  • 18. Privacy controls • Location Services • Access to personal data • Contacts • Microphone • Calendars • Camera • Reminders
  • 19. Result of the court case “The government has now successfully accessed the data stored on Farook’s iPhone and therefore no longer requires the assistance from Apple Inc. mandated by Court’s Order” the filing reads. • The filing doesn’t elaborate on the method used by FBI. • Sources claim for relations between FBI and a 3rd party, probably an Israeli firm, Cellebrite, after whose help FBI withdrew the case.
  • 20. Conclusion “This lawsuit may be over, but the Constitutional and privacy questions it raised are not” Congressman Darrell Issa (R-Calif.), who had criticized the Justice Department's legal effort against Apple, said in a statement.