• @GamingChairModel
    link
    English
    102 months ago

    Stingrays don’t do shit for this. That’s mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn’t get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone’s Internet traffic is encrypted from the ISP.

    The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

    • @[email protected]
      link
      fedilink
      English
      42 months ago

      stingrays can compromise a phone through modem exploits, and pull data from there.

      though not all of them are made equal, they are an entire category of devices.

      • @GamingChairModel
        link
        English
        32 months ago

        Oh damn, just read about these baseband exploits. Ok, you’ve changed my mind.