The FBI is preparing to break two other Apple devices

Few days have elapsed since the federal announcement that they have managed to break the iPhone of the terrorist Syed Farook and the FBI has agreed to help an Arkansas prosecutor unlock two Apple devices (an iPhone and an iPod) to help persecute two adolescents accused of murder.apple fbi

Faulkner County District Attorney Cody Hiland confirmed that the FBI agreed to a request from his office to unlock the two devices. THE of the devices has been deemed necessary as the authorities are facing an impasse in the case involving two teenagers Hunter Drexler (18 years old) and Justin Staton (15 years old) who, while there are indications, cannot be charged with murder.

Teens accused of killing Robert and Patricia Cogdell at home in Conway, 30 miles north of Little Rock.

After the Feds announced on Monday that they had successfully hacked San's iPhone , we mentioned that the war was not over and that there is still a question:

The new bypass method discovered by the FBI, could it be used in any of the 63 other cases involving Apple devices by law enforcement?

Today we seem to have the answer.

Let us recall that the Ministry of Justice of , shortly after the announcement of the first iPhone being jailbroken stated that: the method used to unlock Syed Farook's iPhone “only worked for that particular phone,” an iPhone 5C running iOS 9.

So far there are none for the iPhone model or iOS version of the Arkansas devices, but there are certainly serious doubts about the solvency of the DOJ's statements.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).