One Article Review

Accueil - L'article:
Source ErrataRob.webp Errata Security
Identifiant 1515208
Date de publication 2020-01-28 16:53:00 (vue: 2020-01-28 22:01:15)
Titre There\'s no evidence the Saudis hacked Jeff Bezos\'s iPhone
Texte There's no evidence the Saudis hacked Jeff Bezos's iPhone.This is the conclusion of the all the independent experts who have reviewed the public report behind the U.N.'s accusations. That report failed to find evidence proving the theory, but instead simply found unknown things it couldn't explain, which it pretended was evidence.This is a common flaw in such forensics reports. When there's evidence, it's usually found and reported. When there's no evidence, investigators keep looking. Todays devices are complex, so if you keep looking, you always find anomalies you can't explain. There's only two results from such investigations: proof of bad things or anomalies that suggest bad things. There's never any proof that no bad things exist (at least, not in my experience).Bizarre and inexplicable behavior doesn't mean a hacker attack. Engineers trying to debug problems, and support technicians helping customers, find such behavior all the time. Pretty much every user of technology experiences this. Paranoid users often think there's a conspiracy against them when electronics behave strangely, but "behaving strangely" is perfectly normal.When you start with the theory that hackers are involved, then you have an explanation for the all that's unexplainable. It's all consistent with the theory, thus proving it. This is called "confirmation bias". It's the same thing that props up conspiracy theories like UFOs: space aliens can do anything, thus, anything unexplainable is proof of space aliens. Alternate explanations, like skunkworks testing a new jet, never seem as plausible.The investigators were hired to confirm bias. Their job wasn't to do an unbiased investigation of the phone, but instead, to find evidence confirming the suspicion that the Saudis hacked Bezos.Remember the story started in February of 2019 when the National Inquirer tried to extort Jeff Bezos with sexts between him and his paramour Lauren Sanchez. Bezos immediately accused the Saudis of being involved. Even after it was revealed that the sexts came from Michael Sanchez, the paramour's brother, Bezos's team double-downed on their accusations the Saudi's hacked Bezos's phone.The FTI report tells a story beginning with Saudi Crown Prince sending Bezos a message using WhatsApp containing a video. The story goes:The downloader that delivered the 4.22MB video was encrypted, delaying or preventing further study of the code delivered along with the video. It should be noted that the encrypted WhatsApp file sent from MBS' account was slightly larger than the video itself.This story is invalid. Such messages use end-to-end encryption, which means that while nobody in between can decrypt them (not even WhatsApp), anybody with possession of the ends can. That's how the technology is supposed to work. If Bezos loses/breaks his phone and needs to restore a backup onto a new phone, the backup needs to have the keys used to decrypt the WhatsApp messages.Thus, the forensics image taken by the investigators had the necessary keys to decrypt the video -- the investigators simply didn't know about them. In a previous blogpost I explain these magical WhatsApp keys and where to find them so that anybody, even you at home, can forensics their own iPhone, retrieve these keys, and decrypt their own videos.
Envoyé Oui
Condensat 000 150 2019 22mb about above absolutely account accurate accusation accusations accused action activity actually after against aliens all along already alternate always amount amounts anomalies anomaly another any anybody anything app approximately are aren artifacts attachment attack background backup bad baseline because been began beginning behave behaving behavior behind being besos between bezos bias bizarre blogpost break breed brother buckets bug bunk but bytes called came can cards causes certainly changed code common complete completely complex comprehensive conclusion conclusionfurther confirm confirmation confirming considered consistent conspiracy contain containing contains continues:we continuing couldn crapy create crown culpability current customers daily data date day debug debunked decrypt delaying delivered demonstration described design details device devices didn dispute doesn done double down downed download downloader dragons dramatically edge egress either electronics email encrypted encryption end ends engineer engineers entire escalating even ever every evidence examination example excessive execution exfiltrated exfiltration exist exonerate exonerated exonerating expect experience experiences expert experts explain explanation explanation: explanations exploit extort extra fact failed fall february file find fix flaw following forensics forward found from fti further get goes:the going great guilt hack hacked hacker hackers had has have healthy helping hidden hide high him hinges hired his home hourly hours house how however idea image immediately implicates implies important impression independent inefficient inexplicable innocent inquirer inside instead invalid investigation investigations: investigators involved iphone isn its itself jeff jet job jumped just keep keys know lack large larger lauren least like likely link linked longer looking loses/breaks mainstream malware many maps massive may mbs mean means megabytes message messages michael might months more motive much must national necessary needs never new nice nobody normal not noted occurred odd often one only only the onto opportunity order other out over own padding paramour paranoid percent perfectly performed phone phones plausible podcast podcasts possession possible posts press pretended pretends pretty preventing previous prince probably problems proof props prove proving public rather reason received receiving recognize record recorded records reflecting remember report reported reports responsible restore results retrieve returned revealed reviewed run running same sanchez saudi saudis say see seem seems sending sent sexts should show shown shows side silly simply single size skepticism skunkworks slightly some something sort sourced space specifically standard start started starting stored story strangely study stuff such suggest suggestive support supposed suspicion taken taking team technical technicians technology tells testing than that them them so them when then theories theory there thereafter these these magical thing things think those thread thus time todays traffic transmitted tried trying twisted twitter two uber ufos: unauthorized unbiased unencrypted unexpected unexpectedly unexplainable unknown unmask until uploaded upon use used user users using usually verification versions video videos virus visiting want wasn way website whatsapp when where which who whole will within work works
Tags Hack
Stories Uber
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: