News and Happenings
Mysterious $15,000 'GrayKey' Promises To Unlock iPhone X
Submitted by emailgw, 17-03-2018, 07:36 AM, Thread ID: 80308
Thread Closed
RE: Mysterious $15,000 'GrayKey' Promises To Unlock iPhone X
17-03-2018, 06:20 PM
#2 I actually didn't hear about this until I saw the post. Kudos to Nulled and the OP.
Anyways, after reading the Forbes article, I don't think there can be a permanent solution.
As we know, iOS (and Android, FYI) can lock the possibility of accepting any more password attempts for a set amount of time. Apparently, Grayshift found a way to bypass this system through an exploit, then continuing with a bruteforce-method of cracking the iOS device passwords. This is all done through their little device called the "Grayshift".
So? Well, the bad part is that this is a private cyber-security company and not much is known about them. They do have extremely competent people in this field amongst their ranks and most of them have experience with finding zero-day exploits in Apple devices. This means that the exploit, if it is ever uncovered by Apple, may not take too long to finally be rethought of, recoded and newly launched onto the market with a Graykeyv2.They have been able, reportedly, to use this exploit on a brand new iPhone X which means big trouble for Apple.
Forbes also talked about the "San Bernardino" event which happened a couple of years ago, in which the FBI asked Apple to unlock a device, precisely Syed Rizwan Farook's iPhone, which was allegated to terrorist operations. Apple "vehemently protested" against this so the FBI decided to bring the device to a private company which allegedly unlocked it for about $1M. These exploits aren't new.
This June, Grayshift is supposed to hold a conference in Myrtle Beach, California. This company isn't a black-hat group which means they won't be using this to unlock your iPhone and steal all your data (which, by the way, is stored on the Graykey once it finishes doing its job), they're pushed more towards working with other organizations that study cyber-security and develop patches or report these vulnerabilities to the device's company. Oh, and by "working with", I mean they sell this product to them obviously.
Summarizing this papyrus, people who have nothing to hide shouldn't be worried about this device. Its moderately high-cost ($15k - $30k) means it won't be in the streets and the government uses it for criminal investigations. Remember, to actually unlock a device you need to have physical access to it for hours, days, maybe even weeks depending on the password complexity. Using strong passwords is always recommended and unless you're a terrorist (boo-hoo to you), you shouldn't be affected by it.
I mean, if you're in trouble with federal companies then boy start running 'cause this device will be up in your iPhone in no time. If they want access to your data, they can have it. It's wrong and all but it's a real possibility and, furthermore, it's a real thing. Hackers exist and they have pretty good ones. In other cases, congrats, you're in the majority of the world population and you'll never hear about this thing again. Hopefully.
Anyways, after reading the Forbes article, I don't think there can be a permanent solution.
As we know, iOS (and Android, FYI) can lock the possibility of accepting any more password attempts for a set amount of time. Apparently, Grayshift found a way to bypass this system through an exploit, then continuing with a bruteforce-method of cracking the iOS device passwords. This is all done through their little device called the "Grayshift".
So? Well, the bad part is that this is a private cyber-security company and not much is known about them. They do have extremely competent people in this field amongst their ranks and most of them have experience with finding zero-day exploits in Apple devices. This means that the exploit, if it is ever uncovered by Apple, may not take too long to finally be rethought of, recoded and newly launched onto the market with a Graykeyv2.They have been able, reportedly, to use this exploit on a brand new iPhone X which means big trouble for Apple.
Forbes also talked about the "San Bernardino" event which happened a couple of years ago, in which the FBI asked Apple to unlock a device, precisely Syed Rizwan Farook's iPhone, which was allegated to terrorist operations. Apple "vehemently protested" against this so the FBI decided to bring the device to a private company which allegedly unlocked it for about $1M. These exploits aren't new.
This June, Grayshift is supposed to hold a conference in Myrtle Beach, California. This company isn't a black-hat group which means they won't be using this to unlock your iPhone and steal all your data (which, by the way, is stored on the Graykey once it finishes doing its job), they're pushed more towards working with other organizations that study cyber-security and develop patches or report these vulnerabilities to the device's company. Oh, and by "working with", I mean they sell this product to them obviously.
Summarizing this papyrus, people who have nothing to hide shouldn't be worried about this device. Its moderately high-cost ($15k - $30k) means it won't be in the streets and the government uses it for criminal investigations. Remember, to actually unlock a device you need to have physical access to it for hours, days, maybe even weeks depending on the password complexity. Using strong passwords is always recommended and unless you're a terrorist (boo-hoo to you), you shouldn't be affected by it.
I mean, if you're in trouble with federal companies then boy start running 'cause this device will be up in your iPhone in no time. If they want access to your data, they can have it. It's wrong and all but it's a real possibility and, furthermore, it's a real thing. Hackers exist and they have pretty good ones. In other cases, congrats, you're in the majority of the world population and you'll never hear about this thing again. Hopefully.
Do you prefer to be Infamous or forgotten?
Users browsing this thread: 1 Guest(s)