30 points

I doubt it. That info is first party and not to be trusted since it is obviously marketing. Any third party article that backs up their claims?

permalink
report
reply
2 points

Isn’t it an open secret that powerful entities (like spying institutions) can get into pretty much every system if they have physical access? Why is this not plausible

permalink
report
parent
reply
12 points

Because they would have to possess technology that doesn’t exist in order to circumvent actual encryption without a key.

If I adequately encrypt my own data, and keep the keys a secret, I could hand my hard drive off to Microsoft and they could spend billions running all their AI clusters trying to crack it, and it would be a futile endeavor.

If the government had the technology to bypass encryption or quickly and inexpensively crack it, they’d use it for a whole lot more than unlocking smartphones. They could basically control the flow of Bitcoin on a whim with such tech.

permalink
report
parent
reply
0 points
*
Deleted by creator
permalink
report
parent
reply
-1 points
*

I am aware that there are secure encryptions, but android isn’t hardware encrypted isn’t it? Haven’t used google android for a while, but no encryption was one of the reasons I moved away from it.

No idea about apple, but longer startup times for storage encryption doesn’t seem like a very apple thing to do

Also phones are so seldom turned off, and if the system is running storage encryption becomes less of a concern as the key is somewhere in the ram

permalink
report
parent
reply
0 points

No. You watch too many Movies. Yes there were attempts from state sponsored actors to weaken encryption algorithms. But is encryption easy to crack? No.

permalink
report
parent
reply
0 points
*

Dude what encryption are you talking about? Hardware storage encryption is just by now getting more widely adapted, the phone I used till a year ago didn’t even support any encryption.

Sure, aes-256 with secure password only stored in your mind is quasi 100℅ safe, but that is not how most devices handle their “encryption”.

If the key for the encryption is on the device, and either stored in an unencrypted TPM or unencrypted storage, its not a matter if breaking the encryption (quite impossible) but breaking the software/hardware (quite possible for someone with good enough forensics and skilled programmers)

Also also: encryption only helps if the device is off, which is seldom the case with phones.

permalink
report
parent
reply
27 points
*

They imply they have active cracking abilities for all modern phones, that would be neat to see demonstrated.

It wouldn’t even be hard, just invite third party reporter to bring in a bunch of phones with a capture the flag text file on them. Take each phone one by one behind a screen, break it, bam you don’t have to give away any secrets but you prove that you can break the phone

permalink
report
reply
5 points

And android only allows up to a 16 character password for some reason…

permalink
report
parent
reply
6 points

That is mostly good enough, a password that does not get cracked if it is generated randomly.

permalink
report
parent
reply
6 points

But how are you going to remember a 16 chars mix alpha num symbol password that’s randomly generated?

Yeah the key space is vast but it’s hard for most brains to handle it.

permalink
report
parent
reply
5 points

Why would they do this when they already make millions? The general public isn’t buying their product. They’ll only do private demos.

permalink
report
parent
reply
2 points

There is competition amongst the phone cracking companies. And there’s a limited amount of municipal money available. So they need to differentiate themselves from each other somehow.

There is good data that celibrite can break every phone out there right now, except for grapheneos… But I’ve heard no such data about this company. This means we can only speculate.

So if I was a municipality, and I wanted to decide who got my limited budget, I’d want to compare who’s giving me the best value for money. So I would need some metric, some data point, some way to differentiate them. That’s where reporting, would come in. The websites are public for a reason…

permalink
report
parent
reply
3 points

The websites are there to get a phone call. No municipality is spending this kind of money without a 3-quote requirement and demos. (Unless there is a preexisting relationship/renewal)

permalink
report
parent
reply
3 points

Okay so a company whose entire business model relys on their ability to bypass smartphone security is going to start an arms race with the security community that will lead to their own product losing viability?

There’s absolutely no incentive to do this. They have absolutely no reason to want smartphone security to improve, or to show off how they do what they do.

permalink
report
parent
reply
5 points

I agree they don’t want smartphone security to improve. But they also have to let their customers know which phones they can break.

permalink
report
parent
reply
18 points

“lawful access” lol

permalink
report
reply
5 points

Next will be direct “lawful access” to our thoughts when the tech becomes available

permalink
report
parent
reply
12 points
*

Phones are really not that hard to compromise from an encryption standpoint. All they need to do is break a pin most of the time. Also the pin is very predicable and probably can be pulled from a cloud service like google.

It is actually pretty horrifying to think about

permalink
report
reply
6 points

Or, you know, don’t use pins, use passwords

permalink
report
parent
reply
5 points

And use secure open source ROMs!

permalink
report
parent
reply
0 points

Yeah that might be harder already considering thst, you know, most phone providers don’t give you that option

permalink
report
parent
reply
8 points
*

This looks like old news to me. Years ago I’ve read that three letter agencies can access phones without getting the access code or bio-metrics from the phone owner.

permalink
report
reply

Privacy

!privacy@lemmy.ml

Create post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

Community stats

  • 7.7K

    Monthly active users

  • 1.3K

    Posts

  • 15K

    Comments