← Home ← Back to /g/

Thread 106404079

23 posts 6 images /g/
Anonymous No.106404079 >>106404138 >>106404323 >>106404344 >>106405993 >>106406037 >>106408545 >>106408615 >>106408711 >>106409078
How can law enforcement gain access to a suspect's phone (iPhone or Android)? Aren't these OSs suppose to be difficult to get into? You always hear about what the suspect google searched related to the crime.
Anonymous No.106404138 >>106409071
>>106404079 (OP)
If I remember they buy these devices form israel.
Maybe I am miss remembering but they are devices that can get into phones very easlly and a historical way they get into the phone is when it's in soft-lock mode, after you completely unlock your phone after reboot and lock it again, but I don't know if they have other ways and likely they do.
Anonymous No.106404252 >>106404586
They put a gun against your head and tell you to unlock it.
Anonymous No.106404323 >>106409071
>>106404079 (OP)
/thread
Anonymous No.106404344 >>106404822
>>106404079 (OP)
Google Pegasus or NSO Group
termux-termite !!1GSw688pHqQ No.106404586
>>106404252
Sometimes but usually they'll just ask you to rat on your friend/dealer (both?) and let you walk away.

DESU it doesn't matter what's on your phone because calls/texts/images sent over the internet are usually backed up with very poor if not 0 security. See the tea app driver's license fiasco.
Anonymous No.106404634 >>106407072
they get a warrant to use your finger or face to unlock the phone and then can physically force you to open your device

https://youtu.be/FMaq21hhYC4?si=ZaO2sbBcshKvDyUa&t=212
Anonymous No.106404822
>>106404344
Especially if your a person of interest by a government
Anonymous No.106404846 >>106408585
Literal hardware backdoor
https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature
Anonymous No.106405324
Most people don't use the passphrase option. They say "we'll just jailbreak it" and not give you bail unless you comply.
Anonymous No.106405993
>>106404079 (OP)
>https://en.wikipedia.org/wiki/Key_disclosure_law
Depending on the jurisdiction, you may face criminalization for not disclosing the cryptographic keys.
Anonymous No.106406007
theres these devices that they can plug into your phone and dump its entire contents either by exploits like that pi zero poisontap or they have some advanced keys from manufacturers
Anonymous No.106406037
>>106404079 (OP)
Vadim, you gonna answer the question of this foreign military migrant kid?
Anonymous No.106407072 >>106407162
>>106404634
You can actually make an emergency button that forces you to use password to login instead of fingerprint.
Anonymous No.106407162
>>106407072
on iphone this is just pressing the power button a few times, I think 4 or 5.
it calls emergency but after you cancel the call, it needs your password to unlock again
Anonymous No.106408545
>>106404079 (OP)
not sure desu
Anonymous No.106408585
>>106404846
>... the hardware feature, the researchers still don’t know what ... its purpose is
Anonymous No.106408615
>>106404079 (OP)
If it’s a Pixel or android, they just hook it up to their Google provided cracker.
Anonymous No.106408647
My buddy works for the DEA and he says drug dealers are retarded and always take photos of their drugs, money, and dick. He uses some device they have at the station to plug into and it dumps everything in the phone into their computer system.
Anonymous No.106408649
For big cases? They use Cellebrite. Your town deputy can't afford one and isn't going to get one just to look at your reaction pictures. Easier to use warrants to acquire other data like ISP
Anonymous No.106408711
>>106404079 (OP)

if you study phone os unix systems etc you might get idea that iphone android share same very small base system that is extended to what is android or ios or openlyprofessionalsystem maybe they have device manufacturer support to gain access
Anonymous No.106409071
>>106404323
>>106404138
these but unironically, i've seen a ton of bodycam footage where teh cop just goes "unlock it or you're going to jail right now"

in high profile cases, they just call up apple and get your icloud contents, and usually the evidence they want is stuff that has been transmitted/received so is also stored somewhere else (e.g. texts and location data are held by the phone service provider, photos were probably sent to a honeypot, etc)
Anonymous No.106409078
>>106404079 (OP)
You just beat up the owner.