A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
- Don’t promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
much thanks to @gary_host_laptop for the logo design :)
- 0 users online
- 57 users / day
- 383 users / week
- 1.5K users / month
- 5.7K users / 6 months
- 1 subscriber
- 2.97K Posts
- 74.6K Comments
- Modlog
No it isn’t as it is the default and can not be turned off (that’s good)
Did you read the article? It doesn’t matter if you have encryption, they can break it in under a day.
If encryption doesn’t matter to them, then at least one of these statements must be true of every phone they unlock:
#1 and #2 are possible because government contractors lie all the time about what they actually do. Pretending to decrypt stuff isn’t outside the realm of possibility.
#3 is the biggest concern, especially if they are able to infer what the key is by uncapping silicon or something, because that would mean that any phone that could be unlocked by this company is as good as unencrypted since the device contains the keys in a retrievable format for some reason.
#5 and #6 are pretty much impossible, and such abilities would be far more profitable if used for just about anything but unlocking phones.
That’s not an article. That’s sales pitch.
Are you implying the post title is inaccurate? If so how?
Are you implying that all Lemmy post titles are demonstrably true?
How’s your object permanence?
Just look at the incentives. A company trying to sell a product is going to promise everything.
This is not a third party review of the effectiveness of this product.
So I do not believe sales pitches without evidence
Since they only supply devices to law enforcement, I doubt anyone will find such a review, but I don’t think that means we should believe the product doesn’t work, at least in theory it sounds quite feasible to me. There is some information available online given by law enforcement saying that the product does work, personally I think this is enough that we should believe it does work.
https://www.imore.com/iphone/documents-reveal-exactly-how-much-iphone-hacking-tool-graykey-costs-law-enforcement-including-subscription-costs-company-boasts-turbo-brute-force-feature-for-ios-that-can-access-locked-iphones
https://www.imore.com/unredacted-graykey-nda-outlines-instructions-given-law-enforcement
Yes this one is from the manufacturer but it does have more detail in how the device helped in individual cases if you are to believe what they say: https://www.grayshift.com/wp-content/uploads/101921_eb_Grayshift_AccessToTheTruth_V2-1.pdf
Strong statements require strong evidence.
You should always evaluate opaque claims using multiple sources that have different vested interests
https://discuss.grapheneos.org/d/12848-claims-made-by-forensics-companies-their-capabilities-and-how-grapheneos-fares
Vs
https://www.theverge.com/24199357/fbi-trump-rally-shooter-phone-thomas-matthew-crooks-quantico-mdtf
While I do agree with you, not everyone will agree on the authenticity of a particular source. I guess there is simply no way to be certain what their capabilities really are.
True but that isn’t a reason to give up. We need stronger encryption