Israel Wrote:This is a soft rollout for now, so there's no blogpost - we're rolling it gradually and making sure there aren't any usage cases that go badly (like a phone locking up, etc..)
In September 2010, ElcomSoft announced a password cracking utility for Research In Motion BlackBerry device backups that takes advantage of what Vladimir Katalov, ElcomSoft's CEO, described as the "very strange way, to say the least" in which the BlackBerry uses PBKDF2. The BlackBerry encrypts backup files with AES-256. In turn, the AES key is derived from the user's password using PBKDF2. However the BlackBerry software uses only one PBKDF2 iteration. By contrast, according to Katalov, Apple's iOS 3 uses 2000 iterations and iOS 4 uses 10,000.
Users browsing this forum: Google [Bot] and 3 guests