{"id":178,"date":"2016-07-08T13:35:40","date_gmt":"2016-07-08T10:35:40","guid":{"rendered":"https:\/\/dlshad.net\/?p=178"},"modified":"2016-07-11T23:56:04","modified_gmt":"2016-07-11T20:56:04","slug":"%d9%81%d9%83-%d8%aa%d8%b4%d9%81%d9%8a%d8%b1-%d8%a5%d8%ac%d9%87%d8%b2%d8%a9-%d8%a7%d9%84%d8%a3%d9%86%d8%af%d8%b1%d9%88%d9%8a%d8%af-brute-force-full-disk-encryption","status":"publish","type":"post","link":"https:\/\/dlshad.net\/%d9%81%d9%83-%d8%aa%d8%b4%d9%81%d9%8a%d8%b1-%d8%a5%d8%ac%d9%87%d8%b2%d8%a9-%d8%a7%d9%84%d8%a3%d9%86%d8%af%d8%b1%d9%88%d9%8a%d8%af-brute-force-full-disk-encryption\/","title":{"rendered":"\u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0625\u062c\u0647\u0632\u0629 \u0627\u0644\u0623\u0646\u062f\u0631\u0648\u064a\u062f Brute-force Full Disk Encryption"},"content":{"rendered":"
\u0627\u0644\u0645\u0633\u062a\u0648\u0649:<\/span><\/p>\n \u0645\u062a\u0648\u0633\u0637 \u0627\u0644\u0649 \u0645\u062a\u0642\u062f\u0645<\/b><\/span><\/p>\n \u064a\u0648\u0641\u0631 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 Android \u062e\u062f\u0645\u0629 \u0627\u0644\u0640\u00a0 <\/span>Full Disk Encryption \u0648 \u0627\u0644\u062a\u064a \u062a\u0633\u0645\u062d \u0644\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0628\u062a\u0641\u0634\u064a\u0631 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0645\u062e\u0632\u0646\u0629 \u0639\u0644\u0649 \u0647\u0627\u062a\u0641\u0647\u0645 \u0627\u0644\u0645\u062d\u0645\u0648\u0644 \u0628\u062d\u064a\u062b \u0627\u0646\u0647 \u064a\u0645\u0646\u0639 \u0627\u0644\u0645\u062a\u0637\u0641\u0644\u064a\u0646 \u0645\u0646 \u0627\u0644\u062f\u062e\u0648\u0644 \u0644\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0625\u0646 \u0643\u0627\u0646 \u0639\u0646 \u0637\u0631\u064a\u0642 \u0625\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0647\u0627\u062a\u0641 \u0628\u0648\u0627\u0633\u0637\u0629 \u0643\u0644\u0645\u0629 \u0633\u0631 \u0627\u0648 \u0639\u0646 \u0645\u062d\u0627\u0648\u0644\u0629 \u0627\u0644\u0648\u0635\u0648\u0644 \u0644\u0644\u0640 Storage \u0639\u0646 \u0637\u0631\u064a\u0642 \u0645\u0646\u0641\u0630 \u062e\u0627\u0631\u062c\u064a.<\/span><\/p>\n \u062c\u0645\u064a\u0639\u0646\u0627 \u0646\u062a\u0630\u0643\u0631 \u0642\u0636\u064a\u0629 \u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u062c\u0647\u0627\u0632 \u0627\u0644\u0640 iPhone \u0644\u0644\u0645\u0634\u062a\u0628\u0647 \u0628\u0647 \u0628\u062a\u0641\u062c\u064a\u0631\u0627\u062a \u0633\u0627\u0646 \u0628\u0631\u062f\u064a\u0646\u0648 \u0628\u064a\u0646 \u0627\u0644\u0640 FBI\u00a0 <\/span>\u0648 \u0634\u0631\u0643\u0629 Apple \u0648 \u0627\u0644\u062a\u064a \u0627\u0646\u062a\u0647\u062a \u0628\u0642\u062f\u0631\u0629 \u0627\u0644\u0640 FBI \u0639\u0644\u0649 \u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0647\u0627\u062a\u0641 \u0628\u0637\u0631\u064a\u0642\u0629 \u063a\u064a\u0631 \u0645\u0639\u0644\u0646 \u0639\u0646\u0647\u0627.<\/span><\/p>\n \u064a\u0628\u062f\u0648 \u0623\u0646 \u0627\u0644\u0623\u0645\u0631 \u0628\u0627\u0644\u0646\u0633\u0628\u0629 \u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0640 Android \u0623\u0633\u0647\u0644 \u0628\u0643\u062b\u064a\u0631, \u062d\u064a\u062b \u0627\u0646 \u0627\u0644\u0640 Full Disk Encryption \u0643\u062e\u062f\u0645\u0629 \u064a\u0639\u0645\u0644 \u0639\u0644\u0649 \u062a\u0639\u0645\u064a\u0629 \u0625\u0645\u0643\u0627\u0646\u064a\u0629 \u0627\u0644\u0648\u0635\u0648\u0644 \u0644\u0644\u0645\u0644\u0641\u0627\u062a \u0648 \u0645\u0646\u0647\u0627 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 \u0646\u0641\u0633\u0647 \u0625\u0644\u0649 \u0627\u0646 \u064a\u0642\u0648\u0645 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0628\u0625\u062f\u062e\u0627\u0644 \u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0627\u0644\u062d\u0642\u064a\u0642\u064a\u0629. \u0648 \u062a\u062f\u0639\u064a Qualcomm \u0645\u0637\u0648\u0631\u0629 \u0627\u0644\u062a\u0634\u0641\u064a\u0631,\u00a0 <\/span>\u0623\u0646 \u0646\u0638\u0627\u0645\u0647\u0627 \u0627\u0644\u0630\u064a \u0637\u0648\u0631\u062a\u0647 \u0644\u0644\u062a\u0634\u0641\u064a\u0631 \u0642\u0648\u064a \u0648 \u0645\u0624\u0645\u0646 \u0625\u0644\u0627 \u0627\u0646 \u0628\u0627\u062d\u062b \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a Gal Beniamini \u0644\u062f\u064a\u0647 \u0631\u0623\u064a \u0623\u062e\u0631 \u0648 \u0642\u062f \u0646\u0634\u0631\u0647 \u0641\u064a \u062a\u062f\u0648\u064a\u0646\u0629 \u0645\u0648\u0636\u062d\u0627\u064b \u0643\u064a\u0641\u064a\u0629 \u0639\u0645\u0644 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0648 \u0643\u064a\u0641 \u064a\u0645\u0643\u0646 \u0645\u0647\u0627\u062c\u0645\u062a\u06471.<\/span><\/p>\n \u0628\u062d\u0633\u0628 \u062a\u0635\u0631\u064a\u062d \u0627\u0644\u0628\u0627\u062d\u062b, \u064a\u0628\u062f\u0648 \u0627\u0646\u0647 \u062a\u0648\u0627\u0635\u0644 \u0645\u0639 \u0634\u0631\u0643\u0629 Qualcomm \u0627\u0644\u0645\u0633\u0624\u0648\u0644\u0629 \u0639\u0646 \u062a\u0637\u0648\u064a\u0631 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0641\u064a \u0646\u0638\u0645 Android \u0648 \u0639\u0644\u0649 \u0645\u0627 \u064a\u0628\u062f\u0648 \u0627\u0646 \u062d\u0644 \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u0644\u0646 \u064a\u0643\u0648\u0646 \u0633\u0647\u0644\u0627\u064b \u0648 \u0633\u064a\u062d\u062a\u0627\u062c \u062a\u062f\u062e\u0644\u0627\u064b \u0644\u062a\u0639\u062f\u064a\u0644 \u0645\u062e\u0637\u0637 \u0633\u064a\u0631 \u0639\u0645\u0644 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0648 \u0633\u064a\u0643\u0648\u0646 \u0627\u0644\u062a\u0639\u062f\u064a\u0644 \u0639\u0644\u0649 \u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u0640 Hardware \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u0627\u0646\u0647 \u0644\u0646 \u064a\u0643\u0648\u0646 \u0627\u0644\u062d\u0644 \u0639\u0646 \u0637\u0631\u064a\u0642 Push updates \u064a\u062a\u0645 \u062a\u062d\u0645\u064a\u0644\u0647\u0627 \u0628\u0644 \u064a\u062c\u0628 \u0639\u0644\u064a\u0646\u0627 \u0627\u0644\u0625\u0646\u062a\u0638\u0627\u0631 \u0644\u0646\u0631\u0649 \u0627\u0644\u062d\u0644\u0648\u0644 \u0627\u0644\u062a\u064a \u0645\u0646 \u0627\u0644\u0645\u0645\u0643\u0646 \u0627\u0646 \u062a\u0643\u0648\u0646 \u0634\u0631\u0627\u0621 \u0627\u062c\u0647\u0632\u0629 \u062c\u062f\u064a\u062f\u0629 \u0648 \u0627\u0644\u0625\u0633\u062a\u063a\u0646\u0627\u0621 \u0639\u0646 \u0627\u062c\u0647\u0632\u062a\u0646\u0627 \u0627\u0644\u062d\u0627\u0644\u064a\u0629. <\/span><\/p>\n \u0643\u064a\u0641 \u064a\u0639\u0645\u0644 \u062a\u0634\u0641\u064a\u0631 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 Android?<\/b><\/span><\/p>\n \u0628\u062d\u0633\u0628 \u0645\u0627 \u0648\u0631\u062f \u0641\u064a \u0627\u0644\u0645\u0633\u062a\u0646\u062f\u0627\u062a \u0627\u0644\u0631\u0633\u0645\u064a\u0629 \u0639\u0644\u0649 \u0645\u0648\u0642\u0639 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 \u0627\u0644\u0631\u0633\u0645\u064a \u0628\u0645\u0627 \u064a\u062e\u0635 \u0627\u0644\u062a\u0634\u0641\u064a\u0631(2), \u0641\u0623\u0646 Android\u00a0 <\/span>\u064a\u0633\u062a\u062e\u062f\u0645 \u0646\u0638\u0627\u0645 \u062a\u0634\u0641\u064a\u0631\u0647 \u0627\u0644\u0645\u0628\u0646\u064a \u0639\u0644\u0649 dm-crypt \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0641\u064a \u0646\u0638\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 Linux. \u064a\u0639\u0645\u0644 \u0627\u0644\u0640 dm-crypt \u0643\u0648\u0638\u064a\u0641\u0629 \u0639\u0644\u0649 \u0645\u0633\u062a\u0648\u0649 \u0627\u0644\u0640 Kernel \u0648 \u0627\u0644\u062a\u064a\u00a0 <\/span>\u0628\u0625\u0645\u0643\u0627\u0646\u0647\u0627 \u0627\u0644\u0639\u0645\u0644 \u0639\u0644\u0649 \u0637\u0628\u0642\u0629 \u0627\u0644\u0640 Block Device \u0648 \u0627\u0644\u062a\u064a \u0628\u0625\u0645\u0643\u0627\u0646\u0647\u0627 \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 \u0628\u0642\u064a\u0629 \u0648\u062d\u062f\u0627\u062a \u0627\u0644\u062a\u062e\u0632\u064a\u0646 \u0627\u0644\u062e\u0627\u0631\u062c\u064a\u0629 \u0627\u064a\u0636\u0627\u064b \u0648 \u062a\u0634\u0641\u064a\u0631\u0647\u0627 \u0643\u0640 \u0643\u0631\u0648\u062a \u0627\u0644\u0630\u0627\u0643\u0631\u0629.<\/span><\/p>\n \u064a\u0639\u062a\u0645\u062f \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0639\u0644\u0649 \u062e\u0648\u0627\u0631\u0632\u0645\u064a\u0629 128 AES \u0643\u0645\u0627 \u0627\u0646 \u0627\u0644\u062e\u0648\u0627\u0631\u0632\u0645\u064a\u0629 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u0629 \u0644\u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0627\u0644\u0631\u0626\u064a\u0633\u064a \u0647\u064a \u0627\u064a\u0636\u0627\u064b AES 128.<\/span><\/p>\n \u0639\u0646\u062f\u0645\u0627 \u0646\u0642\u0648\u0645 \u0628\u062a\u0634\u0641\u064a\u0631 \u062c\u0647\u0627\u0632 \u0645\u0639\u064a\u0646, \u064a\u0642\u0648\u0645 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 \u0628\u062a\u0648\u0644\u064a\u062f \u0645\u0641\u062a\u0627\u062d \u0631\u0626\u064a\u0633\u064a \u0644\u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u062c\u0647\u0627\u0632 \u0644\u0646\u0633\u0645\u064a\u0647 Master encryption key, \u064a\u062a\u0645 \u0628\u0648\u0627\u0633\u0637\u062a\u0647 \u062a\u0634\u0641\u064a\u0631 \u0648 \u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0639\u0644\u0649 \u0627\u0644\u062c\u0647\u0627\u0632 \u0648 \u0645\u0646 \u062b\u0645 \u064a\u062a\u0645 \u062a\u0648\u0644\u064a\u062f Salt-Hash \u062e\u0627\u0635 \u0628\u0627\u0644\u0640 Master encryption Key \u0648 \u0628\u0639\u062f\u0647\u0627 \u064a\u062a\u0645 \u0625\u062c\u0631\u0627\u0621 key derivation function \u0648 \u0627\u0644\u062a\u064a \u062a\u0639\u0646\u064a \u062a\u0648\u0644\u064a\u062f \u0645\u0641\u062a\u0627\u062d \u0639\u0634\u0648\u0627\u0626\u064a \u0627\u062e\u0631 \u0645\u0633\u062a\u062e\u0631\u062c \u0645\u0646 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0627\u0644\u0640 Master \u064a\u0633\u062a\u0637\u064a\u0639 \u062a\u0634\u0641\u064a\u0631 \u0648 \u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0627\u0644\u0640 Master encryption Key \u0628\u0648\u0627\u0633\u0637\u0629 \u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0627\u0644\u062a\u064a \u0633\u064a\u062e\u062a\u0627\u0631\u0647\u0627 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645, \u0648 \u064a\u062a\u0645 \u062a\u062e\u0632\u064a\u0646\u0647 \u0641\u064a \u0642\u0633\u0645 \u0627\u0648 (Block) \u063a\u064a\u0631 \u0645\u0634\u0641\u0631 \u0639\u0644\u0649 \u0648\u062d\u062f\u0629 \u0627\u0644\u062a\u062e\u0632\u064a\u0646 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u0647\u0627\u062a\u0641.<\/span><\/p>\n \u0648 \u0633\u062a\u0643\u0648\u0646 \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u0643\u0627\u0644\u062a\u0627\u0644\u064a:<\/span><\/p>\n <\/p>\n \u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0640 Brute Force \u062a\u0639\u062a\u0628\u0631 \u0627\u0644\u0637\u0631\u064a\u0642\u0629 \u0627\u0644\u0623\u0643\u062b\u0631 \u0634\u064a\u0648\u0639\u0627\u064b \u0644\u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0647\u0630\u0627 \u0627\u0644\u0646\u0648\u0639 \u0645\u0646 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0648 \u0627\u0644\u0630\u064a \u064a\u0639\u062a\u0645\u062f \u0639\u0644\u0649 \u062a\u062c\u0631\u0628\u0629 \u062c\u0645\u064a\u0639 \u0627\u0644\u0625\u062d\u062a\u0645\u0627\u0644\u0627\u062a \u0627\u0644\u0645\u0645\u0643\u0646\u0629 \u0645\u0646 \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d \u0648 \u0627\u0644\u062a\u064a \u0633\u062a\u0624\u062f\u064a \u0644\u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u062d\u062a\u0648\u0649 \u0627\u0644\u0645\u0634\u0641\u0631.<\/span><\/p>\n \u0644\u0643\u064a \u064a\u062a\u0645 \u0645\u0646\u0639 \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u0645\u0646 \u062a\u062c\u0631\u0628\u0629 \u0643\u0627\u0641\u0629 \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d \u0627\u0644\u0645\u0645\u0643\u0646\u0629 \u0648 \u0627\u0644\u062a\u064a \u062a\u062a\u0645 \u0639\u0646 \u0637\u0631\u064a\u0642 \u0628\u0631\u0646\u0627\u0645\u062c \u062d\u0627\u0633\u0648\u0628\u064a \u064a\u062c\u0631\u064a \u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u0645\u062d\u0627\u0648\u0644\u0627\u062a \u0641\u064a \u0627\u0644\u062b\u0627\u0646\u064a\u0629 \u0627\u0644\u0648\u0627\u062d\u062f\u0629, \u064a\u062a\u0645 \u062a\u0637\u0648\u064a\u0631 \u0622\u0644\u064a\u0629 \u0644\u0645\u0646\u0639 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0645\u0646 \u062a\u062c\u0631\u0628\u0629 \u0623\u0643\u062b\u0631 \u0645\u0646 \u0623\u062d\u062a\u0645\u0627\u0644 \u0648 \u0639\u0644\u0649 \u0633\u0628\u064a\u0644 \u0627\u0644\u0645\u062b\u0627\u0644 \u064a\u062a\u0645 \u0642\u0641\u0644 \u0625\u0645\u0643\u0627\u0646\u064a\u0629 \u0645\u062d\u0627\u0648\u0644\u0629 \u0641\u062a\u062d \u062a\u0634\u0641\u064a\u0631 \u0645\u0639\u064a\u0646 \u0628\u0648\u0627\u0633\u0637\u0629 \u0643\u0644\u0645\u0627\u062a \u0633\u0631 \u0641\u064a \u062d\u0627\u0644 \u062a\u062c\u0627\u0648\u0632 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 5 \u0645\u062d\u0627\u0648\u0644\u0627\u062a \u0644\u0645\u062f\u0629 30\u00a0 <\/span>\u062b\u0627\u0646\u064a\u0629 \u0648 \u0627\u0644\u062a\u064a \u0628\u062f\u0648\u0631\u0647\u0627 \u0633\u062a\u0645\u0646\u0639 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u062a\u062e\u0645\u064a\u0646 \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d \u0645\u0646 \u0625\u062a\u0645\u0627\u0645 \u0639\u0645\u0644\u0647\u0627 \u0627\u0648 \u062a\u062d\u0642\u064a\u0642 \u0627\u0644\u0639\u0645\u0644 \u0627\u0644\u0645\u0631\u062c\u0648 \u0645\u0646\u0647\u0627. \u0648 \u0641\u064a \u0628\u0639\u0636 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u064a\u062a\u0645 \u062a\u062f\u0645\u064a\u0631 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0628\u0639\u062f \u0639\u062f\u0629 \u0645\u062d\u0627\u0648\u0644\u0627\u062a.<\/span><\/p>\n \u062a\u062a\u0645 \u0647\u0630\u0647 \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u0636\u0645\u0646 \u0627\u0644\u0640\u00a0 <\/span>Running operating system \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u0627\u0646 \u0647\u0646\u0627\u0644\u0643 \u062a\u0637\u0628\u064a\u0642 \u0645\u0639\u064a\u0646 \u0645\u0647\u0645\u062a\u0647 \u0627\u064a\u0642\u0627\u0641 \u0645\u062d\u0627\u0648\u0644\u0627\u062a \u0625\u062f\u062e\u0627\u0644 \u0643\u0644\u0645\u0627\u062a \u0633\u0631 \u062e\u0627\u0637\u0626\u0629 \u0648 \u062a\u062f\u0645\u064a\u0631 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0628\u0639\u062f \u0639\u062f\u0629 \u0645\u062d\u0627\u0648\u0644\u0627\u062a \u062e\u0627\u0637\u0626\u0629.<\/span><\/p>\n \u0645\u0627\u0630\u0627 \u0639\u0646 \u0645\u062d\u0627\u0648\u0644\u0629 \u0641\u0643 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u062e\u0627\u0631\u062c \u0625\u0637\u0627\u0631 \u0627\u0644\u0640 Running operating <\/strong> system \u0627\u0648 \u0627\u0644\u0640 off-device brute-force attacks\u061f<\/b><\/span><\/p>\n \u062a\u0645 \u062d\u0644 \u0647\u0630\u0647 \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u0639\u0646 \u0637\u0631\u064a\u0642 \u0628\u0646\u0627\u0621 Hardware-backed Keystore \u0648 \u0627\u0644\u062a\u064a \u0628\u062f\u0648\u0631\u0647\u0627 \u062a\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 \u0627\u0644\u0640 Master Key \u0648 \u062a\u0631\u0628\u0637\u0647 \u0628\u0627\u0644\u0640 Hardware \u0627\u0644\u062e\u0627\u0635 \u0628\u0627\u0644\u062c\u0647\u0627\u0632, \u0648 \u0639\u0644\u0649 \u0623\u0633\u0627\u0633\u0647 \u062a\u0645 \u0625\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0640 Keymaster HAL \u0641\u064a \u0647\u0630\u0647 \u0627\u0644\u0639\u0645\u0644\u064a\u0629.<\/span><\/p>\n \u062a\u0639\u062a\u0628\u0631 \u0627\u0644\u0640 Keymaster HAL \u0645\u0643\u062a\u0628\u0629 \u062f\u064a\u0646\u0627\u0645\u064a\u0643\u064a\u0629 \u0645\u0646 \u0627\u0644\u0645\u0645\u0643\u0646 \u0627\u0644\u062a\u0648\u0627\u0635\u0644 \u0645\u0639\u0647\u0627 \u0628\u0648\u0627\u0633\u0637\u0629\u00a0 <\/span>\u0627\u0644\u0640 Service \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u062a\u062e\u0632\u064a\u0646 \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d, \u0648 \u0627\u0644\u062a\u064a \u0628\u062f\u0648\u0631\u0647\u0627 \u062a\u0633\u062a\u0637\u064a\u0639 \u0627\u0644\u0642\u064a\u0627\u0645 \u0628\u0640 Hardware Encryption.<\/span><\/p>\n \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u062c\u0645\u064a\u0639\u0647\u0627 \u062a\u062d\u0635\u0644 \u0628\u0639\u064a\u062f\u0627\u064b \u0639\u0646 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 \u0648 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646, \u0628\u0644 \u0647\u064a \u0628\u0639\u064a\u062f\u0629 \u0643\u0644 \u0627\u0644\u0628\u0639\u062f \u0639\u0646 \u0648\u062d\u062f\u0627\u062a \u0627\u0644\u062a\u062e\u0632\u064a\u0646 \u0627\u0644\u062a\u064a \u064a\u0633\u062a\u062e\u062f\u0645\u0647\u0627 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0644\u062a\u0634\u063a\u064a\u0644 \u0647\u0627\u062a\u0641\u0647.<\/span><\/p>\n <\/p>\n \u0628\u0645\u0639\u0646\u0649 \u0622\u062e\u0631, \u0641\u064a \u062d\u0627\u0644 \u0623\u0631\u0627\u062f \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u062a\u0634\u0641\u064a\u0631 \u0628\u064a\u0627\u0646\u0627\u062a \u0645\u0639\u064a\u0646\u0629, \u064a\u0642\u0648\u0645 \u0627\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u063a\u064a\u0631 \u0622\u0645\u0646 \u0628\u062a\u0632\u0648\u064a\u062f \u0627\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u0622\u0645\u0646 \u0628\u0645\u0641\u062a\u0627\u062d \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u0634\u0641\u0631\u00a0 <\/span>, \u0648 \u0645\u0646 \u062b\u0645 \u064a\u0642\u0648\u0645 \u0627\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u0622\u0645\u0646 \u0628\u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0627\u0644\u0645\u0641\u062a\u0627\u062d\u00a0 <\/span>\u0648 \u0645\u0646 \u062b\u0645 \u0625\u0631\u0633\u0627\u0644\u0647 \u0644\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u063a\u064a\u0631 \u0622\u0645\u0646, \u0648 \u0641\u064a \u062d\u0627\u0644 \u0631\u063a\u0628 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0628\u062a\u0641\u0639\u064a\u0644 \u0627\u0644\u062a\u0634\u0641\u064a\u0631, \u064a\u0642\u0648\u0645 \u0627\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u063a\u064a\u0631 \u0622\u0645\u0646 \u0628\u0625\u0631\u0633\u0627\u0644 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0644\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u0622\u0645\u0646 \u0648 \u0645\u0646 \u062b\u0645 \u0628\u062f\u0648\u0631\u0647 \u064a\u0642\u0648\u0645 \u0628\u062a\u0634\u0641\u064a\u0631\u0647 \u0648 \u0625\u0639\u0627\u062f\u0629 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0645\u0634\u0641\u0631\u0627\u064b \u0644\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u063a\u064a\u0631 \u0622\u0645\u0646, \u0627\u064a \u0627\u0646 \u0645\u0647\u0645\u0629 \u0627\u0644\u0640 Master Key \u0641\u064a \u0627\u0644\u0639\u0627\u0644\u0645 \u0627\u0644\u0622\u0645\u0646 \u062a\u062a\u0644\u062e\u0635 \u0628\u062a\u0646\u0641\u064a\u0630 \u0639\u0645\u0644\u064a\u0629 \u0645\u0639\u064a\u0646\u0629 \u0644\u062a\u0634\u0641\u064a\u0631 \u0648 \u0641\u0643 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0628\u062f\u0648\u0646 \u0643\u0634\u0641 \u062e\u0648\u0627\u0631\u0632\u0645\u064a\u0629 \u0648 \u062a\u0641\u0627\u0635\u064a\u0644 \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u062e\u0627\u0631\u062c \u0627\u0644\u0625\u0637\u0627\u0631 \u0627\u0644\u0622\u0645\u0646.<\/span><\/p>\n \u0648 \u0628\u062a\u062d\u0644\u064a\u0644 \u0643\u064a\u0641 \u064a\u0642\u0648\u0645 Android \u0628\u062a\u0634\u0641\u064a\u0631 \u0648 \u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0648\u062d\u062f\u0627\u062a \u0627\u0644\u062a\u062e\u0632\u064a\u0646, \u0642\u0627\u0645 \u0645\u0643\u062a\u0634\u0641 \u0627\u0644\u062b\u063a\u0631\u0629 Gal Beniamini \u0628\u062a\u0635\u0645\u064a\u0645 \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u0648 \u0627\u0644\u062a\u064a \u062a\u062a\u0645 \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u0643\u0627\u0644\u062a\u0627\u0644\u064a:<\/span><\/p>\n <\/p>\n \u0643\u0645\u0627 \u0647\u0648 \u0645\u0648\u0636\u062d \u0641\u064a \u0627\u0644\u0645\u062e\u0637\u0637, \u0645\u0646 \u0623\u062c\u0644 \u0631\u0628\u0637 \u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u0640 key derivation function \u0625\u0644\u0649 \u0627\u0644\u0640 Hardware \u0627\u0644\u062e\u0627\u0635 \u0628\u0627\u0644\u062c\u0647\u0627\u0632, \u064a\u0648\u062c\u062f \u062d\u0642\u0644 \u0641\u0627\u0631\u063a \u0645\u0644\u062d\u0642 \u0628\u0627\u0644\u0640 Crypto Footer \u0648 \u0627\u0644\u062a\u064a \u062a\u0639\u062a\u0628\u0631 \u0627\u0644\u0640 Partition \u0627\u0644\u062e\u0627\u0635 \u0628\u0648\u062d\u062f\u0629 \u0627\u0644\u062a\u062e\u0632\u064a\u0646 \u0627\u0644\u0645\u0634\u0641\u0631\u0629 \u0648 \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0648\u064a \u0627\u0644\u0640 Meta data \u0627\u0644\u0645\u062a\u0639\u0644\u0642\u0629 \u0628\u0627\u0644\u062a\u0634\u0641\u064a\u0631, \u0648 \u064a\u062a\u0645\u0648\u0636\u0639 \u0647\u0630\u0627 \u0627\u0644\u062d\u0642\u0644 \u0627\u0644\u0641\u0627\u0631\u063a \u0627\u0644\u0640 KeyMaster-generated key blob \u0648 \u0627\u0644\u062a\u064a \u062a\u0639\u062a\u0628\u0631 \u0627\u0644\u0642\u0633\u0645 \u0627\u0644\u0630\u064a \u064a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0627\u0644\u062e\u0627\u0635 \u0627\u0644\u0645\u0634\u0641\u0631 \u0648 \u0627\u0644\u0630\u064a \u064a\u0633\u062a\u062e\u062f\u0645 \u0644\u062a\u0648\u0642\u064a\u0639 Sign \u0645\u0641\u062a\u0627\u062d \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0623\u062b\u0646\u0627\u0621 \u0639\u0645\u0644 \u0627\u0644\u0640 key derivation function, \u0648 \u0647\u0646\u0627 \u064a\u062a\u0645 \u0625\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0640 KeyMaster module \u0648 \u0627\u0644\u062a\u064a \u0628\u062f\u0648\u0631\u0647\u0627 \u0633\u062a\u0642\u0648\u0645 \u0628\u062a\u0648\u0644\u064a\u062f \u0645\u0641\u062a\u0627\u062d intermediate key \u064a\u0633\u062a\u062e\u062f\u0645 \u0641\u064a\u00a0 <\/span>\u0643\u0644 \u0637\u0644\u0628 \u0641\u0643 \u062a\u0634\u0641\u064a\u0631.<\/span><\/p>\n \u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0644\u0644\u062d\u0642\u0644 \u0627\u0644\u0641\u0627\u0631\u063a \u0627\u0644\u0645\u062a\u0648\u0627\u062c\u062f \u0641\u064a \u0627\u0644\u0640 Crypto Footer , \u064a\u0648\u062c\u062f \u062d\u0642\u0644 \u0623\u062e\u0631 \u0644\u0627 \u0639\u0644\u0627\u0642\u0629 \u0644\u0647 \u0641\u064a \u0639\u0645\u0644\u064a\u0629 \u0641\u0643 \u0627\u0644\u062a\u0634\u0641\u064a\u0631, \u0648 \u062a\u0643\u0648\u0646 \u0642\u064a\u0645\u0629 \u0647\u0630\u0627 \u0627\u0644\u062d\u0642\u0644 \u0645\u0633\u062a\u0645\u062f\u0629 \u0645\u0646 \u062a\u0634\u063a\u064a\u0644 \u0627\u0644\u0640 scrypt \u0639\u0644\u0649 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0627\u0644\u0622\u062e\u064a\u0631intermediate key\u00a0 <\/span>(IK3)\u00a0 <\/span>\u0648 \u062a\u0648\u062c\u062f \u0641\u064a \u0627\u0644\u062d\u0642\u0644 \u0627\u0644\u0645\u0633\u0645\u0649 Scrypted IK \u0641\u064a \u0627\u0644\u0645\u062e\u0637\u0637 \u0623\u0639\u0644\u0627\u0647.<\/span><\/p>\n \u0645\u0627\u0644\u0647\u062f\u0641 \u0645\u0646 \u0647\u0630\u0627 \u0627\u0644\u062d\u0642\u0644 \u0648 \u0627\u0644\u0642\u064a\u0645\u0629 \u0627\u0644\u062a\u064a \u064a\u062d\u0641\u0638\u0647\u0627\u061f <\/b><\/span><\/p>\n \u0641\u064a \u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0648 \u0641\u0643 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u064a\u0639\u062a\u0628\u0631 \u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0635\u062d\u0629 \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d \u0648 \u0643\u0644\u0645\u0627\u062a \u0627\u0644\u0633\u0631 \u0645\u0646 \u0623\u0647\u0645 \u0627\u0644\u062e\u0637\u0648\u0627\u062a \u0627\u0644\u062a\u064a \u0644\u0627 \u0639\u0644\u0627\u0642\u0629 \u0644\u0647\u0627 \u0641\u064a \u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0648 \u0641\u0643 \u0627\u0644\u062a\u0634\u0641\u064a\u0631, \u0628\u0645\u0639\u0646\u0649 \u0623\u062e\u0631 \u0648 \u0641\u064a \u0647\u0630\u0627 \u0627\u0644\u0645\u062b\u0627\u0644 \u0641\u064a \u0627\u0644\u062a\u062d\u062f\u064a\u062f, \u0627\u0644\u0642\u064a\u0645\u0629 Scrypted IK \u064a\u062a\u0645 \u0625\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627 \u0644\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0635\u062d\u0629 \u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0627\u0644\u062a\u064a \u0623\u062f\u062e\u0644\u0647\u0627 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0644\u0641\u0643 \u062a\u0634\u0641\u064a\u0631 \u0648\u062d\u062f\u0629 \u0627\u0644\u062a\u062e\u0632\u064a\u0646, \u0644\u0644\u062a\u0641\u0631\u064a\u0642 \u0645\u0627\u0628\u064a\u0646 \u0645\u0634\u0643\u0644\u0629 \u0641\u064a \u0648\u062d\u062f\u0629 \u0627\u0644\u062a\u062e\u0632\u064a\u0646 \u062a\u0639\u064a\u0642 \u0641\u0643 \u062a\u0634\u0641\u064a\u0631\u0647\u0627 \u0627\u0648 \u0625\u062f\u062e\u0627\u0644 \u0643\u0644\u0645\u0629 \u0633\u0631\u064a\u0629 \u062e\u0627\u0637\u0626\u0629.<\/span><\/p>\n \u0643\u0645\u0627 \u0647\u0648 \u0645\u0648\u0636\u062d, \u0641\u0623\u0646 \u0639\u0645\u0644\u064a\u0629 \u0631\u0628\u0637 \u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u0640 key derivation function \u0628\u0627\u0644\u0640 Hardware \u0627\u0644\u062e\u0627\u0635 \u0628\u0627\u0644\u062c\u0647\u0627\u0632 \u0642\u0627\u0645\u062a \u0641\u0639\u0644\u064a\u0627\u064b\u00a0 <\/span>\u0628\u062a\u0648\u0642\u064a\u0639 \u0645\u0641\u062a\u0627\u062d intermediate key \u0628\u0648\u0627\u0633\u0637\u0629 \u0627\u0644\u0640 KeyMaster \u0627\u064a \u0627\u0646 \u0627\u0644\u0645\u0641\u062a\u0627\u062d (\u0627\u0644\u0645\u0624\u0642\u062a) \u0627\u0644\u0630\u064a \u062a\u0645 \u062a\u0648\u0642\u064a\u0639\u0647 \u064a\u0633\u062a\u0637\u064a\u0639 \u062a\u0646\u0641\u064a\u0630 \u0645\u0627 \u0637\u0644\u0628 \u0645\u0646\u0647 (\u0641\u0643 \u062a\u0634\u0641\u064a\u0631) \u0648 \u062a\u0645\u062a \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u0628\u062f\u0627\u062e\u0644 \u0627\u0644\u0640 Hardware \u0648 \u0644\u0643\u0646 \u0625\u0644\u0649 \u0627\u064a \u062f\u0631\u062c\u0629 \u062a\u0639\u062a\u0628\u0631 \u0647\u0630\u0647 \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u0645\u062d\u0645\u064a\u0629 \u0648 \u0623\u0646 \u0627\u0644\u0640 Hardware \u064a\u0633\u062a\u0637\u064a\u0639 \u0641\u0639\u0644\u064a\u0627\u064b \u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d\u061f <\/span><\/p>\n \u062d\u0627\u0648\u0644 \u0645\u0643\u062a\u0634\u0641 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 Documantation \u062a\u062e\u0635 \u0627\u0644\u0639\u0645\u0644\u064a\u0629 \u0625\u0644\u0649 \u0627\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0645\u062a\u0648\u0627\u062c\u062f\u0629 \u063a\u064a\u0631 \u0643\u0627\u0641\u064a\u0629 \u0643\u0644\u064a\u0627\u064b \u0644\u062a\u062d\u062f\u064a\u062f \u0645\u062f\u0649 \u0642\u0648\u0629 \u0622\u0645\u0627\u0646 \u0647\u0630\u0647 \u0627\u0644\u0639\u0645\u0644\u064a\u0629, \u0644\u0630\u0627 \u0639\u0645\u0644 \u0645\u0643\u062a\u0634\u0641 \u0627\u0644\u062b\u063a\u0631\u0629 \u0639\u0644\u0649\u00a0 <\/span>\u0625\u062c\u0631\u0627\u0621 \u062a\u062d\u0644\u064a\u0644 \u0644\u0644\u0633\u0648\u0631\u0633 \u0643\u0648\u062f \u0627\u0644\u062e\u0627\u0635 \u0628\u062a\u0634\u0641\u064a\u0631 \u0648\u062d\u062f\u0627\u062a \u0627\u0644\u062a\u062e\u0632\u064a\u0646 \u0648\u0648\u0635\u0644 \u0644\u0644\u0646\u062a\u064a\u062c\u0629 \u0627\u0644\u062a\u0627\u0644\u064a\u0629 :<\/span><\/p>\n 1. \u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u0640 key derivation function \u0644\u0627 \u062a\u062a\u0645 \u0641\u064a \u0627\u0644\u0640 Hardware , \u0628\u0644 \u064a\u062a\u0645 \u062a\u0648\u0644\u064a\u062f \u0645\u0641\u062a\u0627\u062d \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0648 \u062d\u0641\u0638\u0647 \u0641\u064a \u0645\u0646\u0637\u0642\u0629 \u0627\u0644\u0640 TrustZone \u0648 \u064a\u0643\u0648\u0646 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0645\u0633\u062a\u0645\u062f \u0641\u0642\u0637 \u0645\u0646 \u0627\u0644\u0640 Hardware generator \u0627\u064a \u0627\u0646\u0647 \u0644\u064a\u0633 \u0643\u0645\u0627 \u062a\u0645 \u0648\u0635\u0641\u0647 \u0623\u0639\u0644\u0627\u0647.<\/span><\/p>\n 2. \u0644\u0643\u0648\u0646 \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0645\u062a\u0648\u0641\u0631 \u0641\u064a \u0645\u0646\u0637\u0642\u0629 \u0627\u0644\u0640 TrustZone, \u062a\u0633\u062a\u0637\u064a\u0639 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0627\u0644\u0645\u0635\u0646\u0639\u0629 \u0644\u0644\u0640 Hardware \u062a\u0632\u0648\u064a\u062f \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u0628\u0625\u0645\u0643\u0627\u0646\u064a\u0629 \u062a\u0648\u0642\u064a\u0639 \u0646\u0633\u062e\u0629 \u0627\u0644\u0640 TrustZone \u0648 \u0627\u0644\u062a\u064a \u0628\u062f\u0648\u0631\u0647\u0627 \u0633\u062a\u0633\u0647\u0644\u00a0 <\/span>\u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u0640 Bruteforce \u0644\u0643\u0644\u0645\u0629 \u0627\u0644\u0633\u0631 \u0648 \u0625\u0633\u062a\u062e\u0631\u0627\u062c \u0645\u0641\u062a\u0627\u062d \u0641\u0643 \u0627\u0644\u062a\u0634\u0641\u064a\u0631.<\/span><\/p>\n 3. \u062d\u062a\u0649 \u0648 \u0625\u0646 \u062a\u0645 \u0625\u0635\u0644\u0627\u062d \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0648 \u062a\u062d\u062f\u064a\u062b \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 \u0648 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u0641\u064a\u0631, \u064a\u0633\u062a\u0637\u064a\u0639 \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u0625\u0646 \u0627\u0645\u062a\u0644\u0643\u00a0 <\/span>Image \u0645\u0634\u0641\u0631\u0629 \u0645\u0646 \u0648\u062d\u062f\u0629 \u0627\u0644\u062a\u062e\u0632\u064a\u0646 \u0639\u0644\u0649 Downgrade \u0627\u0644\u0640 Framework \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u062c\u0647\u0627\u0632 \u0648 \u0645\u062d\u0627\u0648\u0644\u0629 \u0641\u0643 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0628\u0627\u0644\u0637\u0631\u064a\u0642\u0629 \u0627\u0644\u0645\u0648\u0636\u062d\u0629 \u0623\u0639\u0644\u0627\u0647.<\/span><\/p>\n \u0627\u0644\u0645\u062d\u0635\u0644\u0629:<\/b><\/span><\/p>\n \u0639\u0645\u0644\u064a\u0629 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0644\u064a\u0633\u062a \u0622\u0645\u0646\u0629 \u0643\u0645\u0627 \u064a\u0648\u0635\u0641\u0647\u0627 \u0627\u0644\u0625\u0646\u062f\u0631\u0648\u064a\u062f , \u0643\u0645\u0627 \u0627\u0646 \u0639\u0645\u0644\u064a\u0629 \u062d\u0641\u0638 \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d \u0644\u0627 \u062a\u062a\u0645 \u0641\u0639\u0644\u064a\u0627\u064b \u0639\u0644\u0649 \u0627\u0644\u0640 Hardware \u0627\u0644\u0645\u0633\u0624\u0648\u0644 \u0639\u0646 \u062a\u062e\u0632\u064a\u0646 \u0627\u0644\u0645\u0641\u062a\u0627\u062d, \u0643\u0645\u0627 \u0627\u0646 \u0645\u0647\u0645\u0629 \u0627\u0644 Hardware \u062a\u0642\u062a\u0635\u0631 \u0641\u0642\u0637 \u0639\u0644\u0649 \u062a\u0648\u0642\u064a\u0639 \u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d \u0644\u064a\u062a\u0645 \u0625\u0633\u062a\u062e\u062f\u0627\u0645\u0647\u0627 \u0641\u064a \u0641\u0643 \u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0645\u0645\u0627 \u064a\u062c\u0639\u0644 \u0627\u0644\u0625\u062e\u062a\u0631\u0627\u0642 \u0627\u0644\u0623\u0645\u0646\u064a \u0627\u0643\u0628\u0631 \u062e\u0635\u0648\u0635\u0627\u064b \u0641\u064a \u0648\u062c\u0648\u062f Hardware \u0645\u0637\u0648\u0631 \u0645\u0646 \u0642\u0628\u0644 \u0634\u0631\u0643\u0629 \u0645\u0639\u064a\u0646\u0629 \u0645\u0646 \u0627\u0644\u0645\u0645\u0643\u0646 \u0627\u0646 \u062a\u0642\u0648\u0645 \u0628\u062a\u0632\u0648\u064a\u062f \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u0628\u0627\u0644\u0645\u0641\u0627\u062a\u064a\u062d \u0627\u0644\u0645\u0637\u0644\u0648\u0628\u0629 \u0644\u062e\u0631\u0642 \u0627\u0644\u062d\u0645\u0627\u064a\u0629. <\/span><\/p>\n \u0645\u0627\u064a\u0632\u0627\u0644 \u0645\u0643\u062a\u0634\u0641 \u0627\u0644\u062b\u063a\u0631\u0629 \u0648 \u0628\u0639\u0636 \u0627\u0644\u0628\u0627\u062d\u062b\u064a\u0646 \u0645\u0646 \u0627\u0644\u0639\u0645\u0644 \u0639\u0644\u0649 \u0625\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0629 , \u0644\u0644\u0625\u0637\u0644\u0627\u0639 \u0639\u0644\u0649 \u0627\u0644\u062a\u062d\u062f\u064a\u062b\u0627\u062a \u064a\u0631\u062c\u0649 \u0632\u064a\u0627\u0631\u0629 \u0627\u0644\u062a\u062f\u0648\u064a\u0646\u0629 \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u0645\u0648\u0636\u0648\u0639.<\/span><\/p>\n http:\/\/bits-please.blogspot.my\/2016\/06\/extracting-qualcomms-keymaster-keys.html<\/span><\/p>\n —–<\/span><\/p>\n 1- Extracting Qualcomm’s KeyMaster Keys – Breaking Android Full Disk Encryption <\/span>http:\/\/bits-please.blogspot.my\/2016\/06\/extracting-qualcomms-keymaster-keys.html<\/span><\/p>\n 2- Android Full disk Encryption <\/span><\/p>\n https:\/\/source.android.com\/security\/encryption\/<\/span><\/p>\n\n
\n