Home / Tech News / Featured Tech News / Hacker leaks the iOS cracking tools that the FBI paid for

Hacker leaks the iOS cracking tools that the FBI paid for

Last year, the FBI and Apple were embroiled in a legal battle over encryption after Apple refused to unlock an iPhone 5C at the center of an investigation. After it became clear that Apple wasn't going to budge, the FBI hired a firm known as Cellebrite to develop a tool to unlock the iPhone for them. This tool bypassed iOS security but it hasn't stayed under wraps for very long as a hacker has already gotten their hands on the iOS cracking tool and made it public.

In fact, this hacker managed to get their hands on 900GB of Cellebrite data in total, showing that aside from older iPhones, Cellebrite also had tools to hack its way in to Android and BlackBerry devices. Tools that the firm used to unlock ‘newer' iPhones weren't released to the public but speaking with Motherboard, the hacker responsible did want to get across the message that once a backdoor tool exists, it will eventually make its way out.

 

Image Source: Wired/Then One

The Apple VS FBI case came to a head last year when the FBI wanted Apple to write some new software that would allow the security features of iOS to be disabled, essentially creating a backdoor into the software. Apple was opposed to doing this as it understood that creating such a backdoor would leave iOS devices vulnerable.

KitGuru Says: It seems odd that a company that specialises in security and encryption wasn't able to keep its own data protected well enough to avoid its tools being stolen. 

Become a Patron!

Check Also

Clair Obscur Expedition 33

Clair Obscur: Expedition 33 patch brings difficulty adjustments and more

The latest patch for Clair Obscur: Expedition 33 brings big changes to the game’s story mode difficulty, ultrawide support and more.

One comment

  1. There will never be a “secure” phone unless you build the hardware and create the OSsoftware yourself, or maybe purchase one of these https://goo.gl/zAQ5u7.

We've noticed that you are using an ad blocker.

Thank you for visiting KitGuru. Our news and reviews teams work hard to bring you the latest stories and finest, in-depth analysis.

We want to be as informative as possible – and to help our readers make the best buying decisions. The mechanism we use to run our business and pay some of the best journalists in the world, is advertising.

If you want to support KitGuru, then please add www.kitguru.net to your ad blocking whitelist or disable your adblocking software. It really makes a difference and allows us to continue creating the kind of content you really want to read.

It is important you know that we don’t run pop ups, pop unders, audio ads, code tracking ads or anything else that would interfere with the KitGuru experience. Adblockers can actually block some of our free content, such as galleries!