SlideShare a Scribd company logo
Dept. of Computer Sc. & Engineering
RTU, Kota
Seminar on
iOS Encryption
&
Apple v/s FBI
iOS Security and Encryption
Contents
Terrorist attack in San Bernardino
Investigations leading to terrorist’s iPhone 5C
Demands of FBI
Reaction of Apple Inc.
Introduction to iOS security
Result of the court case
Conclusion
Terrorist attack in San Bernardino
• On December 2, 2015, 14 killed and 22 injured at Inland Regional
Center, SB, California.
• The perpetrators were Syed Rizwan Farook and Tashfeen Malik
who targeted a public event.
• FBI was unable to unlock the recovered iPhone 5C with iOS 9
operating system issued to its employee, Syed, due to its advanced
security features.
Investigations leading to terrorist’s iPhone
5C
• Device's encryption technology was enabled, preventing the FBI from
accessing its contents without knowing the device's 4 or 6 digit PIN.
NBC News reporting on it:
“In a 40-page filing, the U.S. Attorney's Office in Los Angeles argued that it
needed Apple to help it find the password and access "relevant, critical data"
on the locked cellphone of Syed Farook, who with his wife Tashfeen Malik
murdered 14 people in San Bernardino, California on December 2.”
Demands of FBI
• Apple should create a unique version of iOS that would bypass
security protections on the iPhone Lock screen.
• It would also add a completely new capability so that passcode tries
could be entered electronically.
• Disabling the feature that wipes the data on the phone after 10
incorrect tries at entering a password.
• Thus making it easier to unlock an iPhone by “brute force,” trying
millions of combinations without risking the deletion of the data.
Reaction of Apple Inc.
• Passcode lock & manual entry is the heart of the safeguards.
• Unlocking one iPhone would be the equivalent of a master key,
capable of opening hundreds of millions of locks.
• Strongest suggestions offered was to pair the phone to a previously
joined network, allowing FBI to back up the phone and get the data.
• The iPhone couldn’t access iCloud services due to change in
password by FBI.
• Handed over all the data it had, including a backup of the iPhone in
question.
Introduction to iOS security
• Security kept at core, analyzing security hazards
of the desktop environment.
• Every iOS device combines software, hardware,
and services designed to work together for
maximum security.
• After iOS 7, Apple decided to protect much more
of the data under the user's passcode.
• Starting with iOS 8, all of the data on an iPhone is
encrypted on disk with extremely strong
encryption.
Security Classifications
System security
Encryption and data protection
App security
Network security
Apple Pay
Internet services
Device controls
Privacy controls
.
Security architecture diagram
of iOS provides a visual
overview of the different
technologies
System security
• Boot-up process, software updates and Secure
Enclave
• Secure boot chain
• System Software Authorization
• Secure Enclave
Encryption and data protection
• Hardware security features
• File Data Protection
• Passcodes
App security
• App code signing
• Runtime process security
• Extensions
• App Groups
• Data Protection in apps
Network security
• TLS
• VPN
• WiFi
• Bluetooth
Apple Pay
• Apple Pay components
oSecure Element
oNFC controller
oWallet
oSecure Enclave
oApple Pay Servers
Internet services
• Apple ID
• iMessage
Device controls
• Passcode protection
• iOS pairing model
• Configuration enforcement
• Mobile device management (MDM)
• Device restrictions
• Remote wipe
• Find My iPhone and Activation Lock
Privacy controls
• Location Services
• Access to personal data
• Contacts
• Microphone
• Calendars
• Camera
• Reminders
Result of the court case
“The government has now successfully accessed the data stored
on Farook’s iPhone and therefore no longer requires the
assistance from Apple Inc. mandated by Court’s Order” the
filing reads.
• The filing doesn’t elaborate on the method used by FBI.
• Sources claim for relations between FBI and a 3rd party, probably an
Israeli firm, Cellebrite, after whose help FBI withdrew the case.
Conclusion
“This lawsuit may be over, but the
Constitutional and privacy questions it
raised are not”
Congressman Darrell Issa (R-Calif.), who had criticized the
Justice Department's legal effort against Apple, said in a
statement.
Thank You!

More Related Content

What's hot (20)

PPTX
Android vs Ios
G Sumeet Samuel
 
PPTX
Android security
Midhun P Gopi
 
PPTX
Android pentesting
Mykhailo Antonishyn
 
PPT
ios vs android.ppt
Abhishek suthar
 
PPTX
iOS I phone operating system
Hùssâîn Mîrzã
 
PPTX
Apple iOS
Chetan Gowda
 
PPTX
Android Security
Arqum Ahmad
 
PPTX
Apple iOS Introduction
Pratik Vyas
 
PDF
Multimedia on android
Ramesh Prasad
 
PPTX
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
Phil Tully
 
PPTX
Zero Trust 20211105
Thomas Treml
 
PDF
iOS PPT
Sarika Naidu
 
PDF
RISC-V-Day-Tokyo2018-suzaki
Kuniyasu Suzaki
 
PDF
NFC Everywhere
NFC Forum
 
PPTX
How to do Cryptography right in Android Part Two
Arash Ramez
 
PPTX
Android Operating System
Prathamesh Bhosale
 
PPTX
mobile Os
Abhishek Singh
 
PPTX
Android Hacking + Pentesting
Sina Manavi
 
PDF
IOT Security
Sylvain Martinez
 
PDF
OS Fingerprinting
Rashmika Nawaratne
 
Android vs Ios
G Sumeet Samuel
 
Android security
Midhun P Gopi
 
Android pentesting
Mykhailo Antonishyn
 
ios vs android.ppt
Abhishek suthar
 
iOS I phone operating system
Hùssâîn Mîrzã
 
Apple iOS
Chetan Gowda
 
Android Security
Arqum Ahmad
 
Apple iOS Introduction
Pratik Vyas
 
Multimedia on android
Ramesh Prasad
 
StringSifter: Learning to Rank Strings Output for Speedier Malware Analysis
Phil Tully
 
Zero Trust 20211105
Thomas Treml
 
iOS PPT
Sarika Naidu
 
RISC-V-Day-Tokyo2018-suzaki
Kuniyasu Suzaki
 
NFC Everywhere
NFC Forum
 
How to do Cryptography right in Android Part Two
Arash Ramez
 
Android Operating System
Prathamesh Bhosale
 
mobile Os
Abhishek Singh
 
Android Hacking + Pentesting
Sina Manavi
 
IOT Security
Sylvain Martinez
 
OS Fingerprinting
Rashmika Nawaratne
 

Similar to iOS Security and Encryption (20)

PDF
Apple vs FBI on Data Privacy
Frances Coronel
 
PPTX
Google & microsoft joins apple vs fbi
Ekankita Agrawalla
 
DOCX
1- In the dispute between the FBI and Apple- which side do you support.docx
Edwardk3aWallacey
 
PDF
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Webrazzi
 
PDF
iPhone Apple iOS backdoors attack-points surveillance mechanisms
Mariano Amartino
 
PDF
iOS backdoors attack points and surveillance mechanisms
Dario Caliendo
 
PDF
Apple could face heat from police on refusing data access, expert says
fatacre7807
 
PPTX
iPhone and iPad Security
Simon Guest
 
PDF
iOS Forensics: where are we now and what are we missing?
Reality Net System Solutions
 
PDF
iPhone Data Protection in Depth
Seguridad Apple
 
PDF
Ios Application Security The Definitive Guide For Hackers And Developers Davi...
durresaiman
 
PPTX
Android vs iOS encryption systems
Birju Tank
 
PPTX
Apple vs. FBI
Andrew Birkeland
 
PDF
iOS secure app development
Dusan Klinec
 
PDF
Listening In Cybersecurity In An Insecure Age Susan Landau
ajxiuphdyc9019
 
DOCX
iPhone dilemmaThis is a discussion of a case. You will be graded
mariuse18nolet
 
DOCX
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
vrickens
 
PPTX
osi semair.pptx
amerdawood2
 
PPTX
[Wroclaw #2] iOS Security - 101
OWASP
 
PDF
The state of the art in iOS Forensics
Reality Net System Solutions
 
Apple vs FBI on Data Privacy
Frances Coronel
 
Google & microsoft joins apple vs fbi
Ekankita Agrawalla
 
1- In the dispute between the FBI and Apple- which side do you support.docx
Edwardk3aWallacey
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
Mariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
Dario Caliendo
 
Apple could face heat from police on refusing data access, expert says
fatacre7807
 
iPhone and iPad Security
Simon Guest
 
iOS Forensics: where are we now and what are we missing?
Reality Net System Solutions
 
iPhone Data Protection in Depth
Seguridad Apple
 
Ios Application Security The Definitive Guide For Hackers And Developers Davi...
durresaiman
 
Android vs iOS encryption systems
Birju Tank
 
Apple vs. FBI
Andrew Birkeland
 
iOS secure app development
Dusan Klinec
 
Listening In Cybersecurity In An Insecure Age Susan Landau
ajxiuphdyc9019
 
iPhone dilemmaThis is a discussion of a case. You will be graded
mariuse18nolet
 
iPhone dilemmaThis is a discussion of a case. You will be graded.docx
vrickens
 
osi semair.pptx
amerdawood2
 
[Wroclaw #2] iOS Security - 101
OWASP
 
The state of the art in iOS Forensics
Reality Net System Solutions
 
Ad

Recently uploaded (20)

PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
July Patch Tuesday
Ivanti
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
July Patch Tuesday
Ivanti
 
Ad

iOS Security and Encryption

  • 1. Dept. of Computer Sc. & Engineering RTU, Kota Seminar on iOS Encryption & Apple v/s FBI
  • 3. Contents Terrorist attack in San Bernardino Investigations leading to terrorist’s iPhone 5C Demands of FBI Reaction of Apple Inc. Introduction to iOS security Result of the court case Conclusion
  • 4. Terrorist attack in San Bernardino • On December 2, 2015, 14 killed and 22 injured at Inland Regional Center, SB, California. • The perpetrators were Syed Rizwan Farook and Tashfeen Malik who targeted a public event. • FBI was unable to unlock the recovered iPhone 5C with iOS 9 operating system issued to its employee, Syed, due to its advanced security features.
  • 5. Investigations leading to terrorist’s iPhone 5C • Device's encryption technology was enabled, preventing the FBI from accessing its contents without knowing the device's 4 or 6 digit PIN. NBC News reporting on it: “In a 40-page filing, the U.S. Attorney's Office in Los Angeles argued that it needed Apple to help it find the password and access "relevant, critical data" on the locked cellphone of Syed Farook, who with his wife Tashfeen Malik murdered 14 people in San Bernardino, California on December 2.”
  • 6. Demands of FBI • Apple should create a unique version of iOS that would bypass security protections on the iPhone Lock screen. • It would also add a completely new capability so that passcode tries could be entered electronically. • Disabling the feature that wipes the data on the phone after 10 incorrect tries at entering a password. • Thus making it easier to unlock an iPhone by “brute force,” trying millions of combinations without risking the deletion of the data.
  • 7. Reaction of Apple Inc. • Passcode lock & manual entry is the heart of the safeguards. • Unlocking one iPhone would be the equivalent of a master key, capable of opening hundreds of millions of locks. • Strongest suggestions offered was to pair the phone to a previously joined network, allowing FBI to back up the phone and get the data. • The iPhone couldn’t access iCloud services due to change in password by FBI. • Handed over all the data it had, including a backup of the iPhone in question.
  • 8. Introduction to iOS security • Security kept at core, analyzing security hazards of the desktop environment. • Every iOS device combines software, hardware, and services designed to work together for maximum security. • After iOS 7, Apple decided to protect much more of the data under the user's passcode. • Starting with iOS 8, all of the data on an iPhone is encrypted on disk with extremely strong encryption.
  • 9. Security Classifications System security Encryption and data protection App security Network security Apple Pay Internet services Device controls Privacy controls
  • 10. . Security architecture diagram of iOS provides a visual overview of the different technologies
  • 11. System security • Boot-up process, software updates and Secure Enclave • Secure boot chain • System Software Authorization • Secure Enclave
  • 12. Encryption and data protection • Hardware security features • File Data Protection • Passcodes
  • 13. App security • App code signing • Runtime process security • Extensions • App Groups • Data Protection in apps
  • 14. Network security • TLS • VPN • WiFi • Bluetooth
  • 15. Apple Pay • Apple Pay components oSecure Element oNFC controller oWallet oSecure Enclave oApple Pay Servers
  • 16. Internet services • Apple ID • iMessage
  • 17. Device controls • Passcode protection • iOS pairing model • Configuration enforcement • Mobile device management (MDM) • Device restrictions • Remote wipe • Find My iPhone and Activation Lock
  • 18. Privacy controls • Location Services • Access to personal data • Contacts • Microphone • Calendars • Camera • Reminders
  • 19. Result of the court case “The government has now successfully accessed the data stored on Farook’s iPhone and therefore no longer requires the assistance from Apple Inc. mandated by Court’s Order” the filing reads. • The filing doesn’t elaborate on the method used by FBI. • Sources claim for relations between FBI and a 3rd party, probably an Israeli firm, Cellebrite, after whose help FBI withdrew the case.
  • 20. Conclusion “This lawsuit may be over, but the Constitutional and privacy questions it raised are not” Congressman Darrell Issa (R-Calif.), who had criticized the Justice Department's legal effort against Apple, said in a statement.