wsuffa
Touchdown! Greaser!
Not what I was saying. Brute forcing the actual AES-256 key is entirely different from brute-forcing the way the key is derived. Brute forcing the way the key is derived when the key is likely a 4 digit pin is really silly simple. Of course, they can't do that, because of the self-destruct feature.
We have no disagreement on that.
And yes, I mixed the two items in my statement.
The government *could* very likely extract the encrypted data from the device. They could then attempt to brute-force the AES-256 key all they want. I keep seeing people say this is a path the Feds could easily take. But what they don't realize is nobody can brute-force an AES-256 key right now. There's not enough compute power in the world to accomplish it within my lifetime using the technology that exists today or will exist 10 years from now (unless there's some absolutely major breakthrough in computer science, but that's very unlikely).
It may be possible, but would not easy or timely. (and I stress "may" because even if it exists, it would not be made known that it exists).
There are places in government that possess substantially more computational power than would be made available to the agency involved here. Whether or not that is of sufficient power to break AES-256 is not known by anyone that could discuss it, and there are some very good national security reasons that a) the true computational power could not be disclosed, and b) if it were in fact able to be used on this device, it would not be used (or disclosed that it was used), nor would the data be disclosed. The parts of government that might possibly possess the power would not see this as part of an imminent threat, and would have no reason to disclose the data even to the CiC.
What we have at this point is a forensics investigation, not a national security intelligence operation, and therefore there's no need to even try a brute-force of the AES-256.