Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
kec
on Feb 22, 2016
|
parent
|
context
|
favorite
| on:
Answers to your questions about Apple and security
The users passcode is entangled with a key unique to the hardware of the phone to generate the actual key used to encrypt the device. The hardware key is implemented such that it's impossible to read out via software.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: