• @GamingChairModel
      link
      English
      105 months ago

      Stingrays don’t do shit for this. That’s mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn’t get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone’s Internet traffic is encrypted from the ISP.

      The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

      • @[email protected]
        link
        fedilink
        English
        45 months ago

        stingrays can compromise a phone through modem exploits, and pull data from there.

        though not all of them are made equal, they are an entire category of devices.

        • @GamingChairModel
          link
          English
          35 months ago

          Oh damn, just read about these baseband exploits. Ok, you’ve changed my mind.

    • Uriel238 [all pronouns]
      link
      fedilink
      English
      25 months ago

      IMSI catching is a different thing.

      But yes, exploits are sold by gray hats rather than by white hats and closed. The NSA is supposed to be on top of this, but instead of closing exploits, they keep them to enhance their anti-terror spying, which they then trickle out to US Law Enforcement, especially if there’s loot (liquid assets) that are easy to seize.

      Law enforcement in the US is mostly a highway robbery racket.