
Yesterday I did a thread on how Huawei is trying to manipulate Belgian policy audiences with a fake online ecosystem ahead of a key 5G decision. (https://t.co/ViIp7X5KsN) Huawei did not take kindly to my research.
So here's the thread on Huawei I promised yesterday. It seems Huawei is using social media black ops tactics to try to convince policy-makers in Belgium that it can be trusted to build 5G networks. \U0001f928 pic.twitter.com/noZKM13RuD
— Michiel van Hulten (@mvanhulten) December 22, 2020


Totally agree. Seems like a total fake account. For a person with 800k followers with an account created in only 9 months ago, one would expect that it would be a very important or famous person. But a news search with his name is rather disappointing.
— Javier Villaraco \U0001f3f3\ufe0f\u200d\U0001f308 (@villaraco) December 22, 2020

Enjoy~https://t.co/M7IntqNMjG
— Mike BAI (@Mike_IMC) December 22, 2020

Ik zat al een tijdje op dit dossier, maar gisteren gescooped door @mvanhulten die parallel hetzelfde uitzocht.
— Arbiter (@ArbiterOfTweets) December 23, 2020
De echte publicatieprimeur komt echter van @bickylover - volg die man! - die er zondag al een draadje over publiceerde. Dat kan je hier lezen:https://t.co/m0b8znc4mf
More from Crime
ACLU is suing the FBI over its efforts to break into encrypted devices. https://t.co/TN8X0Slmnf
— Zack Whittaker (@zackwhittaker) December 22, 2020
This was prompted by a claim from someone knowledgeable, who claimed that forensics companies no longer had the ability to break the Apple Secure Enclave Processor, which would make it very hard to crack the password of a locked, recent iPhone. 2/
We wrote an enormous report about what we found, which we’ll release after the holidays. The TL;DR is kind of depressing:
Authorities don’t need to break phone encryption in most cases, because modern phone encryption sort of sucks. 3/
I’ll focus on Apple here but Android is very similar. The top-level is that, to break encryption on an Apple phone you need to get the encryption keys. Since these are derived from the user’s passcode, you either need to guess that — or you need the user to have entered it. 4/
Guessing the password is hard on recent iPhones because there’s (at most) a 10-guess limit enforced by the Secure Enclave Processor (SEP). There’s good evidence that at one point in 2018 a company called GrayKey had a SEP exploit that did this for the X. See photo. 5/
