this post was submitted on 06 Jun 2024
1 points (100.0% liked)

Technology

59601 readers
2940 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

This is a very entertaining and educational article, giving insights into the methods used by thiefs to try and get access to your phone data.

I don't like Apple but it's great that their security is so good when it comes to this.

(page 3) 50 comments
sorted by: hot top controversial new old
[–] ultratiem@lemmy.ca 0 points 5 months ago (1 children)

Why doesn’t anything this interesting happen to me!

As the author found out, these phones end up in Shenzhen. You can buy these burnt logic boards on the cheap and lots do just for testing. Check out Strange Parts on YT, he has soldered lots of boards and shows they sell them in bins. The grey market is the only place for them.

Also, for those that aren’t familiar with how Apple’s encryption works. The OS creates a key pair when you create your account, fully encrypting the contents. The contents become garbage if the key pair cannot be matched. This means even if you don’t remotely wipe the contents, the data they try to get from say recovery software or whatever, cannot be read. It’s of course good to wipe it remotely in case they guess your PIN, but if they can’t, then the data is gone forever. From a technical perspective, it’s actually pretty cool.

[–] Natanael@slrpnk.net 0 points 5 months ago

Android uses similar storage encryption (and you can activate encryption for an SD card if you have sensitive data on it), the encryption key is protected by a TPM or Secure Element chip or by ARM TrustZone or equivalent, it checks that the OS is unmodified before booting and the chip only gives the key to the CPU if the user enters the correct PIN

[–] Zoboomafoo@slrpnk.net 0 points 5 months ago (1 children)

Someone's going to sell your phone on the black market

is my favorite

[–] Delusional@lemmy.world 0 points 5 months ago

Oh no! Then I won't have my phone anymore!

Wait just a second....

[–] Cognitive_Dissident@lemm.ee 0 points 5 months ago (6 children)

I don't 'do' smartphones at all, I think they're an expensive trap -- but if you have an iPhone and it gets stolen, can't you call up Apple and have them brick it, so it can't be used at all anymore? I'd think that would be what you'd ultimately have to do if you can't get it back.

[–] TheLemming@lemm.ee 0 points 5 months ago (1 children)

"I'm too smart and superior for smartphones. I know that noone asked, but I think it's important to share that information. I also can't be bothered to read any part of the article I'm commenting on, considering it doesn't apply to me (being so smart and superior by not having a smart phone). Can someone answer my question that I wouldn't have needed to ask if I read 5 sentences?"

load more comments (1 replies)
[–] TheHowTM@lemmy.world 0 points 5 months ago (1 children)
load more comments (1 replies)
[–] MeaanBeaan@lemmy.world 0 points 5 months ago (1 children)

Yes. In the article she states she did exactly this.

[–] Cursed@lemmus.org 0 points 5 months ago (2 children)

If the guy you're responding to could actually read, he'd be really upset.

load more comments (2 replies)
[–] Liz@midwest.social 0 points 5 months ago (4 children)

I mean, they're extremely useful and cheap, if you buy the right one.

load more comments (4 replies)
load more comments (2 replies)
[–] Wogi@lemmy.world 0 points 5 months ago (1 children)

I also fucking hate Apple, with the same seething rage that redhats hate Windows, and I too must admit this is shockingly effective security.

[–] RidcullyTheBrown@lemmy.world 0 points 5 months ago (5 children)

Is it though? The author of this article knows what they're doing, but a regular person would probably not be as relaxed with some of the threats. I didn't see this in the article, how does the thief have the ability to contact the victim?

[–] Wogi@lemmy.world 0 points 5 months ago

Oh it could be better for sure. But he's got access to all the messages and data, getting a number at that point is probably trivial.

load more comments (4 replies)
[–] thatsnothowyoudoit@lemmy.ca 0 points 5 months ago* (last edited 5 months ago) (1 children)

As someone who’s experienced the same thing, some of the messages I received were shockingly well written.

The fake “find my” site they tried to use to convince me to log into my iCloud account was wildly convincing, if not for the index.php at the end of the URL - something Apple would never configure for service endpoints.

The continued to try - but never threatening. However I never engaged and eventually they just stopped trying.

[–] AllHailTheSheep@sh.itjust.works 0 points 5 months ago

yeah and the said part is most people without the tech background would never notice the index.php in the URL, or care.

[–] BeMoreCareful@lemmy.world 0 points 5 months ago (6 children)

This made me realize, as an android user, I have no idea what I'm supposed to do if someone steals my phone.

[–] nutsack@lemmy.world 0 points 5 months ago

hopefully you have it locked so they just wipe the data. and then you buy a new phone.

[–] meliaesc@lemmynsfw.com 0 points 5 months ago (2 children)

Luckily google keeps track of your every movement by default 🙂

load more comments (2 replies)
[–] potustheplant@feddit.nl 0 points 5 months ago (6 children)

They have the same system. The phone is tied to your account and you can track, lock and erase it remotely with Google's Find My Device.

load more comments (6 replies)
load more comments (2 replies)
load more comments
view more: ‹ prev next ›