• Chozo
    link
    fedilink
    1111 month ago

    Without knowing how they got into his phone, this is a non-story that is just a retelling of older stories. For all we know they just took his dead finger and put it on the reader. Or maybe he used the same 4-digit PIN for his debit card or lock box or something else that they were able to recover. Maybe some detective just just randomly entered the shooter’s birthday, only to say “Hey sarge, you’re never gonna believe this… first try!”

    There’s nothing useful that can be taken away from this story yet, until more details come out.

    • @[email protected]
      link
      fedilink
      English
      2
      edit-2
      1 month ago

      Exactly. The article doesn’t shy away from a bit of free publicity for Cellerite. Which is nowhere near as much of a magic bullet as the “tech media” makes it out to be.

      How do I know it? By doing the most basic of research by heading to their website and looking at their manuals and documentation.

      And Cellerite won’t tell you this publicly because their bottom line depends on their ability to massively overprice their services which they sell to technically illiterate people.

      Any article that mentions Cellerite without a caveat about the dubiousness of their publicity can be disregarded and shouldn’t be taken seriously.

      • @[email protected]
        link
        fedilink
        English
        21 month ago

        “We tried 0000. Tony, write up a press release about how incredible we are at our job and how we spent 400% of our usual overtime on it and send it to the tech press. Make sure they mention we need to triple next year’s budget for security and shit.”

    • XNX
      link
      fedilink
      English
      -131 month ago

      Using a dead persons finger is not possible though

  • @[email protected]
    link
    fedilink
    English
    106
    edit-2
    1 month ago

    Our local sheriff is using some spy level shit in our county that he refuses to explain.

    He keeps “happening” upon crimes just “on accident.” yesterday it was “stopped to take a pee in public park and caught a baddie” and two days before that it was “just happen to follow and pull over a guy with lots of pounds of pot hidden in the car.”

    The US police are spying on Americans phones, internet, GPS, and everything with no judicial recourse because it is corporations spying and then “giving the info” to the police for money.

    The US law enforcement has gone full STAZI but using capitalism as additional cover.

    The US is dead.

    • @rottingleaf
      link
      English
      401 month ago

      Let’s all apologize to Stallman.

      • @demonsword
        link
        English
        141 month ago

        the man has rarely been proven wrong in anything tech related he has said

        • TimeSquirrel
          link
          fedilink
          151 month ago

          Good thing you put the “tech related” qualifier on there. He probably should have stayed in that lane.

          • @TheGrandNagus
            link
            English
            101 month ago

            Indeed.

            It’s also a reminder of why we shouldn’t mindlessly celebrate celebrity figures like they’re deities.

            Stallman has amazing views regarding FOSS, but yeah, some of his other opinions are… interesting.

          • @[email protected]
            link
            fedilink
            English
            11 month ago

            This made me think of Jordan Peterson…some of his early stuff on actual psychology was interesting and informative…then there is all the other stuff, you had a lane stay in it.

            But I guess very minor celebrity can go to someones head and make them do crazy things. /s (damn you Poe’s law)

            • @humorlessrepost
              link
              English
              21 month ago

              He should’ve cleaned his own fucking room.

              I will say his recent interview of (by?) Alex O’Connor was spectacular, though.

      • @[email protected]
        link
        fedilink
        English
        -21 month ago

        Let’s all apologize to Stallman.

        For the twice a day that broken toe-jam-eating watch is right?

    • 🖖USS-Ethernet
      link
      fedilink
      English
      221 month ago

      They’re probably just capturing SMS messages or regular calls. Which is still illegal without a warrant, but who watches the watchers? Use encrypted chats and encrypted calls if you’re worried.

    • @remer
      link
      English
      181 month ago

      “on accident“ 🤮

      • @[email protected]
        link
        fedilink
        English
        61 month ago

        “on accident“ 🤮

        I know. Who SAYS that? It’s by accident. One doesn’t plan these things.

        • @Asidonhopo
          link
          English
          11 month ago

          'Round here we say “with accident” or “of accident”, thank you

      • @PrimeMinisterKeyes
        link
        English
        2
        edit-2
        1 month ago

        As the old and venerable neuromonkey once said:

        Welp. Just let the nukes fly, then. First it’s “on accident,” and before long you’ve got meth addicted baby prostitute warlords running the local Walmart.

    • @Maggoty
      link
      English
      111 month ago

      That’s also a red flag for a dirty cop getting information from criminal group A to go after competition.

      You should probably move.

      • @Lumisal
        link
        English
        31 month ago

        I think it’s the one in New York named Spyder Mann

    • XNX
      link
      fedilink
      English
      31 month ago

      Do you have an article on this?

  • Uriel238 [all pronouns]
    link
    fedilink
    English
    291 month ago

    It’s always a contest between security tools and penetration tools. The problem comes when law enforcement can do this without fair protections of privacy, say if they can easily establish probable cause ( My detection dog is signalling you have illegal data on your phone ) or they are allowed to get a warrant post-hoc for an otherwise illegal search.

    …Or they do the illegal search and then engage in parallel reconstruction e.g. make a fake story about following up on an informant.

    Once the police just seize and crack your phone on a whim, then the state no longer respects your privacy and autonomy, which means you can no longer consent to be governed, rather are controlled by gunpoint (surveillance and use of force). This is one of the critical ingredients to autocratic rule, since it does a lot to neuter the capacity of discontent turning into revolt.

  • @anlumo
    link
    English
    281 month ago

    I’m pretty sure it used to be easier with phones that didn’t have full disk encryption.

      • @[email protected]
        link
        fedilink
        English
        16
        edit-2
        1 month ago

        Unless disabled by timeout, restart, or otherwise manually I’m curious to know why that would be?

        Of course the dude had to know this was a one way trip, I’d have wiped everything but then again maybe they didn’t care at that point.

        • kingthrillgore
          link
          fedilink
          English
          21 month ago

          Wiping isn’t a 100% thing with either Hard disks or Flash. He should have thrown everything into a wood chipper. And yes, this absolutely has to be a one way trip. Either they get you, or you turn the gun on yourself. Nothing good will come of you surviving.

        • @[email protected]
          link
          fedilink
          English
          -151 month ago

          It is hit or miss. The fingerprint button is also looking for the electrical signals of a living person. Apparently, that doesn’t end immediately upon death.

          • @[email protected]
            link
            fedilink
            English
            141 month ago

            Source? Sounds like scifi movie stuff to me, but I’d be interested to read/see more about it

            • @CoolGirl586
              link
              English
              4
              edit-2
              1 month ago

              Your body doesn’t all die at once. The parts that need a constant flow of oxygen die within minutes, while some parts take hours. Tissues like skin, tendons and heart valves are viable for harvest for as long as 48 hours after death.

              https://australian.museum/about/history/exhibitions/death-the-last-taboo/decomposition-body-changes/

              I don’t know how long a fingerprint would work after death though. I imagine it depends on the type of scanner. An optical scanner would probably not care. I’m not sure about ultrasonic. Thermal and capacitive would probably stop working within minutes of death.

              • @[email protected]
                link
                fedilink
                English
                5
                edit-2
                1 month ago

                Lol not that. I’m well aware of that. I meant a source for “fingerprint readers are looking for an electrical signal too” as I’m very sure I’ve heard about them being defeated with a high enough quality reproduction of the finger (read: not flesh at all, let alone alive)

                • @CoolGirl586
                  link
                  English
                  11 month ago

                  Oh, I did a dumb. Capacitive readers use the body’s natural electrical signal to form an image of your fingerprint. You can trick them by using something conductive and running the right amount of electricity through.

                  Dead people don’t work though. Not for very long at least.

          • @Asidonhopo
            link
            English
            21 month ago

            Hit him with a TENS machine then

  • @[email protected]
    link
    fedilink
    English
    141 month ago

    Easier is a very relative term. It’ll be really expensive to use a genuine zero-day to do it. Such exploits are few and far between.

    • @[email protected]
      link
      fedilink
      English
      10
      edit-2
      1 month ago

      How is it expensive? It is if it eqates to the zero day becoming of public domain, and this is not the case here. They can say they guessed the password while in fact they exploited some unknown vulnerability…

      • @[email protected]
        link
        fedilink
        English
        31 month ago

        Zero days are extremely expensive costing in the millions of dollars even if you’re not publishing exploit details. Just using it is extremely costly because each attempt exposes your bug to the world, which is an opportunity that it could get caught and patched. Android and iPhone both have mechanisms to detect and report crashes which could easily cost you your bug. Plus, on the exploit markets, a bug that hasn’t been used is worth more because there have been literally zero days of opportunity to defend against it.

        There is definitely a cost to using something that expensive and that requires a necessary level of risk. You’ve got to be worth it, and the supply of such bugs is extremely low and sometimes zero depending on your exact software version.

        • @[email protected]
          link
          fedilink
          English
          21 month ago

          to be fair to the incompetent people in law enforcement, I do believe “trying to kill a presidential candidate slated to win and being a millimeter away from getting it done” would justify relying on a 0-day.

        • @[email protected]
          link
          fedilink
          English
          11 month ago

          Yes except we are talking about the government of the USA? Markets law are warped in this context. Do you think they sell those? To who? To what purpose, finance healthcare spending? The phone may call home and have things patched? You think they are unable to prevent a phone to call home?

          What?

          • @[email protected]
            link
            fedilink
            English
            2
            edit-2
            1 month ago

            It is not as simple as you imagine. Sometimes a specific bug requires the device to think it’s online and providing this illusion is not perfect. You don’t just plug it in and push a button and you’re good unless perhaps you’ve got a really good bug. Often times, hitting the precise code area required to exploit a bug involves weird scenarios. For example, you might have to talk to the base station for the cell phone tower that can properly authenticate first before you can attack a bug. Sometimes, the bug involves an interaction between multiple phones. It’s not just some magic signals you sent down the cable necessarily. You have to hit the weird behavior. Most trivial stuff exposed over USB has been examined thoroughly. You need to get creative to find more attack surface. There are bugs like that, but you are mistaken if you think categorically there is not risk in exploiting some bugs that can break into a phone. Sometimes it’s trivial to ensure information about your bug is contained. Sometimes it’s not.

            The money isn’t a concern about greed or actually making cash. The money reflects the value and scarcity of these bugs. With that said, yes they sell the exploits. Usually, the people who find the bugs are the ones doing the selling. There’s actually an entire market that exchanges this information if you know the right people. As an obvious example, mercenary malware contains exploits for these bugs. These are organizations like NSO group that buy and sell the information that you would use to do this.

    • @[email protected]
      link
      fedilink
      English
      41 month ago

      But known exploits that have been patched, but not applied because they didn’t update their phone, are plentiful enough.

      Update your phones. Reboot them regularly, too.

      • @[email protected]
        link
        fedilink
        English
        31 month ago

        This is true, but becoming an increasingly less important factor because devices now ship with automatic updates enabled by default.

        Personally, if I had to guess as someone who studies exploits for a living, I’d wager the device isn’t the most recent model and is probably a few years old, so there are likely known unpatchable bootrom or firmware bugs that can be used from their private arsenal without having to risk an actual zero day exploit.

    • @GamingChairModel
      link
      English
      101 month ago

      Stingrays don’t do shit for this. That’s mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn’t get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone’s Internet traffic is encrypted from the ISP.

      The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

      • @[email protected]
        link
        fedilink
        English
        41 month ago

        stingrays can compromise a phone through modem exploits, and pull data from there.

        though not all of them are made equal, they are an entire category of devices.

        • @GamingChairModel
          link
          English
          31 month ago

          Oh damn, just read about these baseband exploits. Ok, you’ve changed my mind.

    • Uriel238 [all pronouns]
      link
      fedilink
      English
      21 month ago

      IMSI catching is a different thing.

      But yes, exploits are sold by gray hats rather than by white hats and closed. The NSA is supposed to be on top of this, but instead of closing exploits, they keep them to enhance their anti-terror spying, which they then trickle out to US Law Enforcement, especially if there’s loot (liquid assets) that are easy to seize.

      Law enforcement in the US is mostly a highway robbery racket.

  • @Maggoty
    link
    English
    101 month ago

    This is the would be assassin’s phone.

    They gave that to the NSA or FBI Counter Intel guys who are hooked in with NSA.

    Your phone is not going there.

    However I would be on the lookout for that tech coming down the pipelines.

      • @[email protected]
        link
        fedilink
        English
        61 month ago

        It shouldn’t be when using graphene OS, the installation guide even instructs you to lock it after you’re don’t installing it.

        • @UnsavoryMollusk
          link
          English
          11 month ago

          Interesting, I know some phone reset to stock when relocking it

  • AutoTL;DRB
    link
    fedilink
    English
    61 month ago

    This is the best summary I could come up with:


    Just two days after the attempted assassination at former President Donald Trump’s rally in Butler, Pennsylvania, the FBI announced it “gained access” to the shooter’s phone.

    Cooper Quintin, a security researcher and senior staff technologist with the Electronic Frontier Foundation, said that law enforcement agencies have several tools at their disposal to extract data from phones.

    The bureau famously butted heads with Apple in late 2015 after the company refused to help law enforcement get around the encryption on the San Bernardino, California shooter’s iPhone.

    Early in the following year, Apple refused a federal court order to help the FBI access the shooter’s phone, which the company said would effectively require it to build a backdoor for the iPhone’s encryption software.

    “The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor,” Cook wrote.

    Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory, said the Pensacola shooting was one of the last times federal law enforcement agencies loudly denounced encryption.


    The original article contains 1,208 words, the summary contains 180 words. Saved 85%. I’m a bot and I’m open source!

  • mechoman444
    link
    English
    51 month ago

    Never keep anything on your phone that would require you to lock it.

    I’ve never locked my phone.

  • @[email protected]
    link
    fedilink
    English
    51 month ago

    For GrapheneOS full disk encryption, am I correct in understanding that the disk is encrypted when my phone is locked and decrypted when I unlock it? So I don’t need to turn it off for it to be encrypted, as long as it’s locked it’s encrypted?

  • @sfxrlz
    link
    English
    41 month ago

    Paid by everybodies taxes™️