The FBI is preparing to break two other Apple devices

Few days have elapsed since the federal announcement that they have managed to break the iPhone of the terrorist Syed Farook and the FBI has agreed to help an Arkansas prosecutor unlock two Apple devices (an iPhone and an iPod) to help persecute two adolescents accused of murder.apple fbi

Prosecutor Cody Hiland of Faulkner County has confirmed that the FBI has agreed to a request from his office to unlock the two devices. The violation of the devices has been deemed necessary as the authorities are facing a deadlock in the case involving two teenagers Hunter Drexler (18 years) and Justin Staton (15 years) who while there are indications can not be accused of killing.

Teens accused of killing Robert and Patricia Cogdell at home in Conway, 30 miles north of Little Rock.

After the Feds announced on Monday that they had successfully hacked San Bernardino's iPhone, we reported that the was not finished and that there is still a question:

The new security bypass method discovered by the FBI can be used in any of 63's other Apple-law cases by law enforcement agencies.

Today we seem to have the answer.

Let us recall that the Ministry of Justice of , αμέσως μετά την ανακοίνωση σπασίματος του πρώτου iPhone ανέφερε ότι: η μέθοδος που χρησιμοποιήθηκε για να ξεκλειδώσει το iPhone του Syed Farook "λειτούργησε μόνο για το συγκεκριμένο τηλέφωνο," ένα iPhone 5C με iOS 9.

So far there are none for the iPhone model or iOS version of the Arkansas devices, but there are certainly serious doubts about the solvency of the DOJ's statements.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).