this post was submitted on 03 Mar 2024
457 points (83.2% liked)
Memes
45681 readers
989 users here now
Rules:
- Be civil and nice.
- Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
cops can't crack my iphone, but they can pop most androids instantly...
end of discussion
Shows cop a PinePhone with main partition encrypted with LUKS
i'm a big fan of pinephone and pine64...
Only if user isn't using encryption ( which is standard these days ) or has developer mode usb debugging left open
sadly, this isn't true:
https://en.wikipedia.org/wiki/Cellebrite
So I see a company thay duplicates phones, with no source on cracking encryption, other than their own company got hacked. And if you have a GrapheneOS phone you can shut off external USB. like connecting a cord , headset to computer does nothing unless you can login to phone and turn the USB option on.
Much of your data can just be subpoenaed and then provided to law enforcement without physical access however. Apple complies 90% of the time.
https://www.theguardian.com/technology/2022/sep/23/apple-user-data-law-enforcement-falling-short
Also, there are ways that LE can bypass your iphone's encryption. Just doesn't work all the time.
https://www.vice.com/en/article/4ag5yj/unlock-apple-iphone-database-for-police
GrapheneOS, based on AOSP, is really the only truly private and secure option. Android offering interoperability is not a downside and Apple having a walled garden does not mean it provides increased security. Apple is decidedly not transparent and this is ultimately not a good thing.
You’re talking about data stored in the apple cloud (I think without the account recovery turned off, but I’m not 100% on that). The same is true of googles cloud services.
Agencies haven’t been focusing on getting the actual texts that say “here I go, doing something you don’t like!” For quite a while because of the amount of variability involved. What I hear spooks talking about is building enough pc for a rubber hose interrogation with unsecured parallel data streams like push notifications.
They don't need to. They have the keys.
NOW it's the end of discussion.
No they definitely can.
it took "months" for the fbi to crack one iphone, that belonged to a terrorist...
and that was in 2020, those holes have long been patched.
so, no they can't.