• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    4 months ago

    They imply they have active cracking abilities for all modern phones, that would be neat to see demonstrated.

    It wouldn’t even be hard, just invite third party reporter to bring in a bunch of phones with a capture the flag text file on them. Take each phone one by one behind a screen, break it, bam you don’t have to give away any secrets but you prove that you can break the phone

      • ShortN0te@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        4 months ago

        That is mostly good enough, a password that does not get cracked if it is generated randomly.

    • fmstrat@lemmy.nowsci.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      Why would they do this when they already make millions? The general public isn’t buying their product. They’ll only do private demos.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        There is competition amongst the phone cracking companies. And there’s a limited amount of municipal money available. So they need to differentiate themselves from each other somehow.

        There is good data that celibrite can break every phone out there right now, except for grapheneos… But I’ve heard no such data about this company. This means we can only speculate.

        So if I was a municipality, and I wanted to decide who got my limited budget, I’d want to compare who’s giving me the best value for money. So I would need some metric, some data point, some way to differentiate them. That’s where reporting, would come in. The websites are public for a reason…

  • ShortN0te@lemmy.ml
    link
    fedilink
    arrow-up
    3
    ·
    4 months ago

    I doubt it. That info is first party and not to be trusted since it is obviously marketing. Any third party article that backs up their claims?

    • SomeLemmyUser@discuss.tchncs.de
      link
      fedilink
      arrow-up
      0
      ·
      4 months ago

      Isn’t it an open secret that powerful entities (like spying institutions) can get into pretty much every system if they have physical access? Why is this not plausible

      • Todd Bonzalez@lemm.ee
        link
        fedilink
        arrow-up
        2
        ·
        4 months ago

        Because they would have to possess technology that doesn’t exist in order to circumvent actual encryption without a key.

        If I adequately encrypt my own data, and keep the keys a secret, I could hand my hard drive off to Microsoft and they could spend billions running all their AI clusters trying to crack it, and it would be a futile endeavor.

        If the government had the technology to bypass encryption or quickly and inexpensively crack it, they’d use it for a whole lot more than unlocking smartphones. They could basically control the flow of Bitcoin on a whim with such tech.

      • ShortN0te@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        4 months ago

        No. You watch too many Movies. Yes there were attempts from state sponsored actors to weaken encryption algorithms. But is encryption easy to crack? No.

        • SomeLemmyUser@discuss.tchncs.de
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          4 months ago

          Dude what encryption are you talking about? Hardware storage encryption is just by now getting more widely adapted, the phone I used till a year ago didn’t even support any encryption.

          Sure, aes-256 with secure password only stored in your mind is quasi 100℅ safe, but that is not how most devices handle their “encryption”.

          If the key for the encryption is on the device, and either stored in an unencrypted TPM or unencrypted storage, its not a matter if breaking the encryption (quite impossible) but breaking the software/hardware (quite possible for someone with good enough forensics and skilled programmers)

          Also also: encryption only helps if the device is off, which is seldom the case with phones.

          • ShortN0te@lemmy.ml
            link
            fedilink
            arrow-up
            0
            ·
            4 months ago

            Isn’t it an open secret that powerful entities (like spying institutions) can get into pretty much every system if they have physical access? Why is this not plausible

            You stated in your original comment: “pretty much every system”. So no, any modern phone if android or iOS is by default encrypted.

            If the key for the encryption is on the device, and either stored in an unencrypted TPM or unencrypted storage, its not a matter if breaking the encryption (quite impossible) but breaking the software/hardware (quite possible for someone with good enough forensics and skilled programmers)

            TPMs are by design encrypted.

            Keys are not stored unencrypted at least not when you encrypt your storage with modern solutions and set it up reasonably. You use either your TPM to store the key or store it on the drive and have it encrypted by itself or use a KDF.

            Also also: encryption only helps if the device is off, which is seldom the case with phones.

            No this assumption is wrong. You still would need to circumvent the Login into the device which is mostly secured by a pin or password or biometrics.

            • SomeLemmyUser@discuss.tchncs.de
              link
              fedilink
              arrow-up
              0
              ·
              4 months ago

              If you think TPMs are always encrypted, a key can be encrypted “with itself” and still be any use to you and android system pin is secure you are right. Might also believe in santa

              • ShortN0te@lemmy.ml
                link
                fedilink
                arrow-up
                1
                ·
                4 months ago

                If you think TPMs are always encrypted, a key can be encrypted “with itself” and still be any use to you and android system pin is secure you are right. Might also believe in santa

                Not sure what you are rambling about the TPM.

                Then prove that the Lockscreen is insecure.

  • Possibly linux@lemmy.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    4 months ago

    Phones are really not that hard to compromise from an encryption standpoint. All they need to do is break a pin most of the time. Also the pin is very predicable and probably can be pulled from a cloud service like google.

    It is actually pretty horrifying to think about