While Apple is waiting for the leak to reveal more information about exactly how the FBI has managed to break the iPhone of the San Bernardino terrorist, information generated through informal channels reveals new evidence of who actually violated the security of the device.
At first, everyone believed that the FBI worked with the Israeli tech company Cellebrite to unlock the iPhone without deleting the data. However, according to a Washington Post publication invoking people who know the issue, the federations actually collaborated with a hacker team.
It seems that a hacker team contacted the FBI and suggested a different method of unlocking the device without losing data after 10 unsuccessful attempts to enter the password.
Everything is said to have happened because of the existence of an unknown vulnerability known by hackers in iOS 9 and Apple does not seem to know it until today. In addition to this vulnerability, hackers are reportedly using a custom-built hardware to unlock the device safely.
The FBI has promised a reward to hackers who have undertaken to unlock the device, but the exact amount of money they have received is not known.
The Washington Post also says that hackers are part of a group that "hunts for vulnerabilities in software and gives them to the government," and that it was not the first time it has worked with the FBI.
Custom-built hardware used to unlock the San Bernardino iPhone could be the main reason that FBI can not break other devices.