Jump to content

Let's Talk Mobile Encryption/Security

In light of recent events namely involving Apple and the FBI over the San Bernardino shooting, it has come to light the nature of mobile encryption and security. We're questioning how safe our data really is, which smartphone can you safely carry around and not worry about prying eyes, well let's take a look at the market, because do bear in mind, Apple isn't the only manufacturer, and the iPhone isn't the only device to choose from, in fact, there's many.

 

Originally stated by TechCrunch (http://techcrunch.com/2016/03/28/justice-department-drops-lawsuit-against-apple-over-iphone-unlocking-case/ Accessed: 29/03/2016 @00:46GMT)

Quote

The FBI has unlocked Farook’s iPhone 5c involved in the San Bernardino shooting using an alternative method that didn’t involve Apple. Given this new development, the Department of Justice is dropping the case. The government has been evasive about this alternative method and didn’t provide additional details.

This is a really big deal, and especially seeming as the FBI is being evasive regarding the details on how they have managed to unlock the device, although I'm betting it's something really mundane however, and there is no real security vulnerability, but this is yet to be determined.

 

So what phones can we use confidently? Well the answer is purely subjective, like every smartphone debate, it's all down to user-preference. In terms of the current events surrounding Apple and the FBI, Apple are sure to release security patches that will have their users brimming with confidence once again in no time, but there are other choices, take BlackBerry for example, with the latest offering of the PRIV, being an Android smartphone, it's a budding contender in the arena, and BlackBerry have a very strong track-record for security, they have their fingers in all sorts of pies now, including Samsung Knox, an EMM (Enterprise Mobile Management) solution designed to secure smartphones for business, has been made available to the consumer in the form of MyKnox on supported Samsung Devices, I'll talk about Knox more in a later post if people would like to know more about how it works.

 

I'll set the baseline and tell everyone the secure mobile setup I'm using at the moment:

  • Samsung Galaxy S7 (Exynos Variant)
  • Fingerprint Lock with secure backup password containing upper-case, lower-case, symbols and digits.
  • Samsung Knox enabled with FRP (Factory Reset Protection)
  • Full device encryption including on the MicroSD card.

You may have a different view of what smartphone you find to be the most secure, please feel free to leave a comment, if you liked this article and wanna hear more from me then please give me a thumbs up. ?

Jordan Bell

Forensic Cybersecurity Analyst (6YR Experience)

GSN Global (GSN UK)

 

--------------------------------

Any advice given is purely independent of GSN Global and its affiliates, we can't be held accountable for actions you may take on your software/hardware under our advisement. Please visit GSN UK online for more information about SLA-based services we provide.

Link to comment
Share on other sites

Link to post
Share on other sites

Most main stream phones use very good encryption, take the iphone for example, they use AES-256 bit encryption which has  2^256 different possible keys. In other words, the average Joe isn't going to get into your smart phone, at least not easily. The govt. has supercomputers, but even with those it's very hard to break the encryption, basically you'd have to be important enough for the government to waste resources on cracking your device.

Link to comment
Share on other sites

Link to post
Share on other sites

My phone (Meizu M2 Note, running Flyme 5 beta) isn't so 'secure' - no fingerprint lock or other biometrics.

Actually I don't really need to secure my phone data, as there is none. At least no sensitive data. IF I need to store sensitive data on my phone, PGP will do the job (26 char password, mixalphanumeric set)

 

All my sensitive data is stored on encrypted disks or my LUKS locked USB (with nuke password), both with different 26 chars passwords.

 

About your thread, I think that mobile pivacy/security is necessary, and should be correctly implemented in every phone.

 

Anyway, whatever your phone might be, security and privacy is always up to the end user. If you use whatsapp to talk about private/businness/illegal stuff, then you might as well write the same thing publicly on facebook, as it will never be aa private conversation (telegram is a valid substitute, with P2P and encrypted chat).

 

2 minutes ago, TechFnatic said:

Most main stream phones use very good encryption, take the iphone for example, they use AES-256 bit encryption which has  2^256 different possible keys. In other words, the average Joe isn't going to get into your smart phone, at least not easily. The govt. has supercomputers, but even with those it's very hard to break the encryption, basically you'd have to be important enough for the government to waste resources on cracking your device.

Even if they use AES-256, the user might be dumb enough to use a dictionary word (maybe with a couple of numbers) as password. bruteforce or dictionary attacks made by anyone could decrypt it.But if you use complex enough password, then yeah, it will take a lot more time and resources to attempt a bruteforce.

Computer Case: NZXT S340 || CPU: AMD Ryzen 5 1600 || Cooler: CM Hyper212 Evo || MoBo: MSI B350 Mortar || RAM Vengeance LPX 2x8GB 3200MHz || PSU: Corsair CX600 || SSD: HyperX Fury 120GB & 240GB || HDD: WD Blue 1TB + 1TB 2.5'' backup drive || GPU: Sapphire Nitro+ RX 580 4GB

Laptop 1 HP x360 13-u113nl

Laptop Lenovo z50-75 with AMD FX-7500 || OS: Windows 10 / Ubuntu 17.04

DSLR Nikon D5300 w/ 18-105mm lens

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, TechFnatic said:

Most main stream phones use very good encryption, take the iphone for example, they use AES-256 bit encryption which has  2^256 different possible keys. In other words, the average Joe isn't going to get into your smart phone, at least not easily. The govt. has supercomputers, but even with those it's very hard to break the encryption, basically you'd have to be important enough for the government to waste resources on cracking your device.

Very good point, I suppose the main thing with the way smartphone encryption works, is that it's kind of "on-the-fly" so if someone can get past the lock-screen then they have access to the data on the device.

 

Some have speculated that the FBI's "third-party" suggested unlocking the device by directly copying the NAND straight off the chip and giving themselves an infinite number of attempts at the passcode, but other suspicions are more mundane, like essentially employing one of many exploits for iOS which hit the ether from time to time.

 

Personally, I like the way Samsung Knox works with ARM Trustzone, but I'm leaving that for another post at some point.

Jordan Bell

Forensic Cybersecurity Analyst (6YR Experience)

GSN Global (GSN UK)

 

--------------------------------

Any advice given is purely independent of GSN Global and its affiliates, we can't be held accountable for actions you may take on your software/hardware under our advisement. Please visit GSN UK online for more information about SLA-based services we provide.

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Cryosec said:

My phone (Meizu M2 Note, running Flyme 5 beta) isn't so 'secure' - no fingerprint lock or other biometrics.

Actually I don't really need to secure my phone data, as there is none. At least no sensitive data. IF I need to store sensitive data on my phone, PGP will do the job (26 char password, mixalphanumeric set)

 

All my sensitive data is stored on encrypted disks or my LUKS locked USB (with nuke password), both with different 26 chars passwords.

 

About your thread, I think that mobile pivacy/security is necessary, and should be correctly implemented in every phone.

 

Anyway, whatever your phone might be, security and privacy is always up to the end user. If you use whatsapp to talk about private/businness/illegal stuff, then you might as well write the same thing publicly on facebook, as it will never be aa private conversation (telegram is a valid substitute, with P2P and encrypted chat).

 

Even if they use AES-256, the user might be dumb enough to use a dictionary word (maybe with a couple of numbers) as password. bruteforce or dictionary attacks made by anyone could decrypt it.But if you use complex enough password, then yeah, it will take a lot more time and resources to attempt a bruteforce.

Well said, I think for people at the moment, the focus is on the companies and how well they actually make the effort to protect your data. Apple have always been very forthcoming with their ecosystem in the fact that it's secure and customers should have confidence. If a company is promising excellent security then they should be able to deliver, the fact that the FBI has managed to gain access to the device will raise some questions, sure, but at the end of the day, people will still buy the iPhone.

 

As for online messaging, for my Enterprise solution, I use BBM and BES12 for synchronising email and internal messages, as it's all end-to-end encrypted anyhow, If you could message me about the LUKS locked USB though, that sounds cool, I'd like to know more about that and how to set it up. :) Thanks in advance.

Jordan Bell

Forensic Cybersecurity Analyst (6YR Experience)

GSN Global (GSN UK)

 

--------------------------------

Any advice given is purely independent of GSN Global and its affiliates, we can't be held accountable for actions you may take on your software/hardware under our advisement. Please visit GSN UK online for more information about SLA-based services we provide.

Link to comment
Share on other sites

Link to post
Share on other sites

That Israeli source came through for the FBI and unlocked the San Bernardino shooters iPhone without the help of Apple. 

 

Quote

WASHINGTON (AP) -- The FBI said Monday it successfully used a mysterious technique without Apple Inc.'s help to hack into the iPhone used by a gunman in a mass shooting in California.

I am happy that Apple got off the hook and the FBI got into the phone. However...

 

Quote

The official said federal law enforcement would continue to aid its local and state partners with gaining evidence in cases — implying that the method would be shared with them.

First in line is likely, Manhattan District Attorney Cyrus Vance, who told a U.S. House panel earlier this month that he has 205 iPhones his investigators can't access data from in criminal investigations

This I am pissed off about. FBI swore that they only wanted to get into only one phone, but Tim Cook knew and was right. The FBI didn't want it for just one phone, they lied. They will be sharing this method with local law enforcement to break into the iPhone's they are currently trying to access. Now you know, never trust your governments word. 

 

Edit Source: https://www.yahoo.com/news/justice-department-cracks-iphone-withdraws-220719890.html

GPU: XFX RX 7900 XTX

CPU: Ryzen 7 7800X3D

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Orangeator said:

That Israeli source came through for the FBI and unlocked the San Bernardino shooters iPhone without the help of Apple. 

 

I am happy that Apple got off the hook and the FBI got into the phone. However...

 

This I am pissed off about. FBI swore that they only wanted to get into only one phone, but Tim Cook knew and was right. The FBI didn't want it for just one phone, they lied. They will be sharing this method with local law enforcement to break into the iPhone's they are currently trying to access. Now you know, never trust your governments word. 

The FBI said they only wanted to get into one phone IF it was Apple that helped them do it.  But now that they've found a method that doesn't rely on Apple, who gives a fuck.

 

I for one am glad they found a way to see what intelligence they can gather from the phones belonging to these terrorists.  Perhaps they'll find something that helps them find other terrorists before more attacks can occur.

Guide: DSLR or Video camera?, Guide: Film/Photo makers' useful resources, Guide: Lenses, a quick primer

Nikon D4, Nikon D800E, Fuji X-E2, Canon G16, Gopro Hero 3+, iPhone 5s. Hasselblad 500C/M, Sony PXW-FS7

ICT Consultant, Photographer, Video producer, Scuba diver and underwater explorer, Nature & humanitarian documentary producer

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Orangeator said:

<snip>

Now you know, never trust your governments word. 

Not to sound snotty but Duh.

 

Beside you need to need to fix your post to meet the posting requirements...

COMMUNITY STANDARDS   |   TECH NEWS POSTING GUIDELINES   |   FORUM STAFF

LTT Folding Users Tips, Tricks and FAQ   |   F@H & BOINC Badge Request   |   F@H Contribution    My Rig   |   Project Steamroller

I am a Moderator, but I am fallible. Discuss or debate with me as you will but please do not argue with me as that will get us nowhere.

 

Spoiler

  

 

Character is like a Tree and Reputation like its Shadow. The Shadow is what we think of it; The Tree is the Real thing.  ~ Abraham Lincoln

Reputation is a Lifetime to create but seconds to destroy.

You have enemies? Good. That means you've stood up for something, sometime in your life.  ~ Winston Churchill

Docendo discimus - "to teach is to learn"

 

 CHRISTIAN MEMBER 

 

 
 
 
 
 
 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Last I checked, my G2 doesn't have hardware encryption support, thus I opted not to encrypt in favor of keeping the device on person at all times.

My eyes see the past…

My camera lens sees the present…

Link to comment
Share on other sites

Link to post
Share on other sites

What is the difference between Apple breaking into the phone, or someone else doing it? They need a search warrant to break into a phone, if they have one, they are going to break into it.  Who/what breaks into it is of no importance to the government, they just wanted to be sure that the data wouldn't be erased.  Of fucking course they want to break into lots of phones, there are plenty of confiscated devices of convicted or suspected criminals that could help in investigations.  When you say "FBI swore that they only wanted to get into only one phone" you are misinterpreting the meaning.  They only wanted Apple to disable the security features on that one phone, and that they could keep the method with which they did so to themselves.  As soon as they knew Apple could/would do it, they would obviously start submitting other phones/warrants for them to open up.  Tim Cook's reluctancy to comply has nothing to do with an ill will of the government. He felt that if they created software to break into the iphone, that criminals/hackers would get ahold of it and use it for evil.  And now, with no help of Tim Cook, there's a way to break in, and we'll see how well Cellbrite can protect their methods from the bad guys. 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, EpicGeekonFire said:

Hopefully, Apple is able to patch whatever method was used. Have they publically responded yet?

 

Cellbrite and the FBI sure as hell aren't going to give Apple the method they used.

Link to comment
Share on other sites

Link to post
Share on other sites

I use a Lumia 950XL with the device encryption turned ON.

Device encryption for Windows Phones are built in and optional [Default is OFF].

 

Thing is if you have anything of a personal nature stored on your phone device encryption should be turned on.

I use my phone for a multitude of things including access to a cloud with work documents and other stuff so this is a must for me.

COMMUNITY STANDARDS   |   TECH NEWS POSTING GUIDELINES   |   FORUM STAFF

LTT Folding Users Tips, Tricks and FAQ   |   F@H & BOINC Badge Request   |   F@H Contribution    My Rig   |   Project Steamroller

I am a Moderator, but I am fallible. Discuss or debate with me as you will but please do not argue with me as that will get us nowhere.

 

Spoiler

  

 

Character is like a Tree and Reputation like its Shadow. The Shadow is what we think of it; The Tree is the Real thing.  ~ Abraham Lincoln

Reputation is a Lifetime to create but seconds to destroy.

You have enemies? Good. That means you've stood up for something, sometime in your life.  ~ Winston Churchill

Docendo discimus - "to teach is to learn"

 

 CHRISTIAN MEMBER 

 

 
 
 
 
 
 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Thomp said:

 

Cellbrite and the FBI sure as hell aren't going to give Apple the method they used.

I honestly don't know if Apple should have the legal right to the knowledge of a major security breach of their product. I am sure that Apple will try their absolute hardest to figure it out. I wouldn't even be surprised if they paid that Israeli team for the method. I am sure Apple has a few million bucks to spare, and I am sure the Israeli company could use it. 

GPU: XFX RX 7900 XTX

CPU: Ryzen 7 7800X3D

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Orangeator said:

I honestly don't know if Apple should have the legal right to the knowledge of a major security breach of their product. I am sure that Apple will try their absolute hardest to figure it out. I wouldn't even be surprised if they paid that Israeli team for the method. I am sure Apple has a few million bucks to spare, and I am sure the Israeli company could use it. 

Apple should have the legal right to the information. At least if Apple did not attempt to get their hands on the information they would be liable to their investor base for knowingly having a breached product.

COMMUNITY STANDARDS   |   TECH NEWS POSTING GUIDELINES   |   FORUM STAFF

LTT Folding Users Tips, Tricks and FAQ   |   F@H & BOINC Badge Request   |   F@H Contribution    My Rig   |   Project Steamroller

I am a Moderator, but I am fallible. Discuss or debate with me as you will but please do not argue with me as that will get us nowhere.

 

Spoiler

  

 

Character is like a Tree and Reputation like its Shadow. The Shadow is what we think of it; The Tree is the Real thing.  ~ Abraham Lincoln

Reputation is a Lifetime to create but seconds to destroy.

You have enemies? Good. That means you've stood up for something, sometime in your life.  ~ Winston Churchill

Docendo discimus - "to teach is to learn"

 

 CHRISTIAN MEMBER 

 

 
 
 
 
 
 

 

Link to comment
Share on other sites

Link to post
Share on other sites

32 minutes ago, Orangeator said:

That Israeli source came through for the FBI and unlocked the San Bernardino shooters iPhone without the help of Apple. 

 

I am happy that Apple got off the hook and the FBI got into the phone. However...

 

This I am pissed off about. FBI swore that they only wanted to get into only one phone, but Tim Cook knew and was right. The FBI didn't want it for just one phone, they lied. They will be sharing this method with local law enforcement to break into the iPhone's they are currently trying to access. Now you know, never trust your governments word. 

 

Edit Source: https://www.yahoo.com/news/justice-department-cracks-iphone-withdraws-220719890.html

Nope. Just don't trust the FBI.

Judge a product on its own merits AND the company that made it.

How to setup MSI Afterburner OSD | How to make your AMD Radeon GPU more efficient with Radeon Chill | (Probably) Why LMG Merch shipping to the EU is expensive

Oneplus 6 (Early 2023 to present) | HP Envy 15" x360 R7 5700U (Mid 2021 to present) | Steam Deck (Late 2022 to present)

 

Mid 2023 AlTech Desktop Refresh - AMD R7 5800X (Mid 2023), XFX Radeon RX 6700XT MBA (Mid 2021), MSI X370 Gaming Pro Carbon (Early 2018), 32GB DDR4-3200 (16GB x2) (Mid 2022

Noctua NH-D15 (Early 2021), Corsair MP510 1.92TB NVMe SSD (Mid 2020), beQuiet Pure Wings 2 140mm x2 & 120mm x1 (Mid 2023),

Link to comment
Share on other sites

Link to post
Share on other sites

Maybe they finally took John Mcafee's advice. 

5800X3D / ASUS X570 Dark Hero / 32GB 3600mhz / EVGA RTX 3090ti FTW3 Ultra / Dell S3422DWG / Logitech G815 / Logitech G502 / Sennheiser HD 599

2021 Razer Blade 14 3070 / S23 Ultra

Link to comment
Share on other sites

Link to post
Share on other sites

41 minutes ago, Thomp said:

 

Cellbrite and the FBI sure as hell aren't going to give Apple the method they used.

Unless the Justice Dept has to tell Apple based on the White House's Vulnerability Equities Process.

 

 

I find this a bit fishy. So the FBI makes the claim that there is absolutely no way to get inside that phone without Apples support. They spend a month saying this to the media, and lawyers. 

Then, suddenly, they withdraw. And within a day, it's cracked. That is all too fishy to me, and on top of that, they lied saying that the only way in was through Apple. 

 

It's pretty easy to guess that they used a replay attack on the NAND flash, and I'm sure Apple already assumes that could be the case (and has been fixed on the A7 processors).

If it is simply this, then we know that the iPhone 5C's processor is vulnerable. So, don't buy that.

 

If it's something else, then Apple should be told that way they at least know whats happening and someone doesn't mimic the exploit later on. 

Link to comment
Share on other sites

Link to post
Share on other sites

Well what do you know, when you give a task to someone who knows what they're doing, instead of giving it to a mindless, self serving bureaucrat, shit gets done.

 

Who'da thunk it?

Ketchup is better than mustard.

GUI is better than Command Line Interface.

Dubs are better than subs

Link to comment
Share on other sites

Link to post
Share on other sites

24 minutes ago, Trik'Stari said:

Well what do you know, when you give a task to someone who knows what they're doing, instead of giving it to a mindless, self serving bureaucrat, shit gets done.

 

Who'da thunk it?

The government is still probably gonna do it because they can. That's what the government does!

 

As for the FBI randomly backing out, I agree it's a bit fishy. It's like saying "only you could save the world"(like in every single video game) and 1 day later saying "hey check this out! We did it ourselves! Cool right?"

 

Just the government doing government things.

The smartest idiot you will ever find

Link to comment
Share on other sites

Link to post
Share on other sites

39 minutes ago, Potato_King said:

The government is still probably gonna do it because they can. That's what the government does!

 

As for the FBI randomly backing out, I agree it's a bit fishy. It's like saying "only you could save the world"(like in every single video game) and 1 day later saying "hey check this out! We did it ourselves! Cool right?"

 

Just the government doing government things.

They're backing out, until the public loses interest. Just like congress did with the so-called "internet freedom act". Now they've been under-funding the FCC in an attempt to secretly stop them from doing their job.

 

God our government is full-retard. Why we don't recall all of them, is beyond me.

Ketchup is better than mustard.

GUI is better than Command Line Interface.

Dubs are better than subs

Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, huilun02 said:

Now they be breaking into everyone's iphone... 

As far as we know this exploit only works on iPhones that don't have the secure enclave so 5/5c and older. The 5s and newer may be safe due to more hardware based security.

My posts are in a constant state of editing :)

CPU: i7-4790k @ 4.7Ghz MOBO: ASUS ROG Maximums VII Hero  GPU: Asus GTX 780ti Directcu ii SLI RAM: 16GB Corsair Vengeance PSU: Corsair AX860 Case: Corsair 450D Storage: Samsung 840 EVO 250 GB, WD Black 1TB Cooling: Corsair H100i with Noctua fans Monitor: ASUS ROG Swift

laptop

Some ASUS model. Has a GT 550M, i7-2630QM, 4GB or ram and a WD Black SSD/HDD drive. MacBook Pro 13" base model
Apple stuff from over the years
iPhone 5 64GB, iPad air 128GB, iPod Touch 32GB 3rd Gen and an iPod nano 4GB 3rd Gen. Both the touch and nano are working perfectly as far as I can tell :)
Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×