While Apple waits for the leak to reveal more information για το πώς ακριβώς κατάφερε το FBI να σπάσει το iPhone του τρομοκράτη του San Bernardino, πληροφορίες που προέκυψαν μέσω ανεπίσημων διαύλων, αποκαλύπτουν νέα στοιχεία για το ποιος πραγματικά παραβίασε την ασφάλεια της συσκευής.
At first everyone believed that the FBI worked with the Israeli tech company Cellebrite to unlock iPhone without erasing data. However, according to a Washington Post report citing people familiar with the matter, the feds actually worked with a hacker group.
It seems that a hacker team contacted the FBI and suggested a different method of unlocking the device without losing data after 10 unsuccessful attempts to enter the password.
Everything was allegedly done due to the existence of an unknown vulnerability known to the hackers in iOS 9 and Apple doesn't seem to know about it until today. In addition to the specific vulnerability, the hackers also reportedly used a custom-built hardware to unlock the device securely.
The FBI has promised a reward to hackers who have undertaken to unlock the device, but the exact amount of money they have received is not known.
The Washington Post also says that hackers are part of a group that "hunts for vulnerabilities in software and gives them to the government," and that it was not the first time it has worked with the FBI.
Custom-built hardware used to unlock the San Bernardino iPhone could be the main reason that FBI can not break other devices.