After the news about FBI accesing trump shooters phone some people are speculating that they copied the phone storage so that they could bruteforce it without getting locked out if that is true is there anyway to make it so that your digital device can’t be copied without the passwd if someone has physical acess to it and all the bruteforcing etc have to be done on the original device itself so we have a better chance of privacy . I am a layman but i use a good enough password on my phone and encrypt some sd card storage (which i knoe can be copied bcause i do it myself) but if the phones whole storage can be copied it seems kinda pointless . so my questions are :

1 Does new smartphones do it by default ? if so how is wiping the phone when forgetting password possible ?

2 does full disk encryption do this ?

3 Does windows (8) have any thing that could do this for micro sd card and smartphone ? (some background is i only have a windows 8 craptop and it takes ages to load and Microsoft appstore nor sideloading works now encrypting the laptop is not needed as i barely do anything on it but was thinking if i could encrypt my phone or sd card using it (it is really really slow (think can’t even load MS word in an hour slow) ) if not see question 4 ) also before you ask can’t install linux tried and failed.

4 beside from encrypting certain files using file manager encryption can i encrypt my sd card on android itself by using any app ? (preferably from fdroid ) .

5 is all these even possible or is our only option hoping that our passwds are too complex to be bruteforced ?

6 also many people talk about updating your OS to increasing security but what about outdated hardware ? do they posses a risk or things like USB,sd cards etc which doesn’t get any update ? Do they suffer security risk as time moves on ? is that even a thing ?

Try to answer questions in these format . pardon my ignorance and grammer even if i delete my acc feel free to still comment so it can be useful to others and i may still drop in to see the answers .

  • @[email protected]
    link
    fedilink
    22
    edit-2
    2 months ago

    First of all:

    You can always copy storage if you’re able to physically access it. The only way to prevent this is to secure the chip in a way it destroys itself if physically tampered with (like some TPM chips).

    You should instead opt for a passphrase that is practically impossible to bruteforce on current hardware due to its complexity. Also, try not to disclose the encryption algorithm or software used as this information opens the possibility of exploiting known vulnerabilities.

    VeraCrypt for example is able to completely hide its presence on a volume and the only way to know if a device is encrypted with it is trying to decrypt it using VeraCrypt with the correct passphrase.


    Trying to answer your questions:

    1. Most modern smartphones encrypt their data by default nowadays. The rest depends on the phone itself. Mostly they just delete the encryption keys from the TPM when formatted so this still enables an authority to copy your storage and bruteforce.

    2. No. Encryption does never prevent you from copying the encrypted information. Those are two completely different things.

    3. No. You cannot encrypt the SD card with say Bitlocker and use it on a phone afaik.

    4. Yes, some Androids allow you to encrypt the SD card from within the storage settings.

  • Dekkia
    link
    fedilink
    102 months ago

    One thing I haven’t seen mentioned here yet is that windows 8 is out of support since January 2023.

    It’s good that you don’t use it for anything because there are for sure as hell security issues with it by now.

  • @seaQueue
    link
    7
    edit-2
    2 months ago

    Against a state sponsored adversary like the FBI? No. At that point anything you do will only cost the adversary time and resources to defeat, it’s up to you to determine how much trouble you want to go to and how many of their resources you want them to spend to defeat your protections.

    Self destructing encrypted USB drives can be taken apart after being made safe and the raw data extracted from NAND to be brute forced. It’ll be costly in time, expertise and compute but they’ll get the data in the end. It might take a bomb squad expert, a data retrieval expert, a massive amount of compute and a lot of money but a state sponsored adversary has access to all of that.

    There is no unbeatable security, it’s a matter of how much time and money you want to spend and how hard you want them to have to work to get through it.

    The real answer to your question is “just don’t use a smartphone/computer/whatever and then the adversary can’t copy data that doesn’t exist.” That’s you sacrificing convenience (time) in exchange for security which is what all security boils down to in the end.

  • @[email protected]
    link
    fedilink
    52 months ago

    To avoid copying data out of a device it would need to be stored in a secure enclave of some sort that doesnt allow that. Basically that doesnt exist on consumer devices. You need good passwords, algorithms and OpSec.

  • @[email protected]
    link
    fedilink
    52 months ago

    There are USB flash drives that self destruct after the wrong password is entered too many times.

    • ArgentCorvid [Iowa]
      link
      fedilink
      English
      12 months ago

      At work, if we want to use a USB drive we are required to use one that has a hardware pin pad and onboard encryption. So those exist

  • slazer2au
    link
    English
    32 months ago

    For phones most modern ones come with encryption at rest by default which is why you need a passcode to finish the boot process.

    As for windows, there is Bitlocker but I don’t know if win 8 supports Bitlocker on external drives.

    • @Squizzy
      link
      -52 months ago

      Bitlocker is a pain, but also my mother forgot hers a neighbour bypassed it.

      • Carighan Maconar
        link
        122 months ago

        That’s not how bitlocker works, it was quite obviously not set up correctly.

        • NaN
          link
          fedilink
          English
          42 months ago

          Bet the recovery key was stored in the users MS account. More common since they are pushing the online accounts so hard.

        • @Squizzy
          link
          12 months ago

          What I know is what I said. We bought the laptop new for her from lenovo I think. Months later she went to use it and bitlocker came up. Dont know if she set it up or it was there already but she couldnt get past it. Our neighbour said he could take a look. When it came back it was useable.

  • @[email protected]
    link
    fedilink
    22 months ago

    Phones encrypt the data by default, your password or pin is also needed to authorise the connection with a computer.

    However, many people do insecure things like storing passwords etc in Notes applications, or having simple PINs that are easy to guess, don’t update their devices, or even turning off security features (if they can) because they won’t take a small amount of time to understand them.