Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The users passcode is entangled with a key unique to the hardware of the phone to generate the actual key used to encrypt the device. The hardware key is implemented such that it's impossible to read out via software.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: