Communick News
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
misk@sopuli.xyz to Technology@lemmy.worldEnglish ·
edit-2
8 months ago

Leaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlock

www.404media.co

external-link
message-square
9
link
fedilink
  • cross-posted to:
  • securitynews@infosec.pub
147
external-link

Leaked Documents Show What Phones Secretive Tech ‘Graykey’ Can Unlock

www.404media.co

misk@sopuli.xyz to Technology@lemmy.worldEnglish ·
edit-2
8 months ago
message-square
9
link
fedilink
  • cross-posted to:
  • securitynews@infosec.pub
The documents provide never-been-seen insight into the current cat-and-mouse game between forensics companies and phone manufacturers Apple and Google.

Mirror: https://archive.is/2024.11.19-141227/https://www.404media.co/leaked-documents-show-what-phones-secretive-tech-graykey-can-unlock-2/

alert-triangle
You must log in or register to comment.
  • TechnoFish@lemm.ee
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    2
    ·
    8 months ago

    One good thing about windows phones was that hardly anyone would have been insane enough to spend resources to develop a forensic tool for it.

    • IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      32
      arrow-down
      6
      ·
      edit-2
      2 months ago

      deleted by creator

      • lud@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        9 days ago

        deleted by creator

  • just_another_person@lemmy.world
    link
    fedilink
    English
    arrow-up
    25
    arrow-down
    1
    ·
    8 months ago

    Anyone have the linked docs from the article? Looks like archive didn’t get them in time.

    • GlenRambo@jlai.lu
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 months ago

      Its linked in other commenters post

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    22
    ·
    edit-2
    8 months ago

    https://discuss.grapheneos.org/d/17505-graykey-leaked-doc-of-android-device-capabilities

    https://grapheneos.social/@GrapheneOS/113510696930156578

    • WhyJiffie@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      10
      ·
      8 months ago

      It’s a bit ironic that on the forum the poster did not remove the tracking parameters from the google drive link

    • 🇦🇺𝕄𝕦𝕟𝕥𝕖𝕕𝕔𝕣𝕠𝕔𝕠𝕕𝕚𝕝𝕖@lemm.ee
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      8 months ago

      So essentially grapheneos is keeping me safer than google lol.

      • q5VtXnYt@infosec.pub
        link
        fedilink
        English
        arrow-up
        7
        ·
        8 months ago

        Always has been

  • mac@lemm.ee
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    8 months ago

    Has there been any information about how long physical access is needed for these attack methods to extract data?

    I’ve got my auto restart set at 8 hours, in graphene’s mastodon thread, they say 10 minutes is best for highest levels of security. The short time frame given in that thread makes me wonder if these exploits give instant access to data.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      8 months ago

      Typically the attacks don’t take 10 hours… they take seconds, what takes time is getting the captured device a laboratory and the laboratory having time to look at it. So what will happen usually is the phone is put into a faraday bag, hooked up to a usb charger, and put on a shelf until the laboratory can get around to it.

      Once the lab starts attacking the phone, it could take seconds as I said above, but some attacks are more involved requiring the phone to be disassembled and leads soldered onto the board. The restarting is about reducing the time the lab has before they can start and finish their attack

      The same process applies to computers and laptops as well, there are lots of mouse jigglers for sale to prevent a screen saver from going on.

Technology@lemmy.world

technology@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !technology@lemmy.world

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


  • @L4s@lemmy.world
  • @autotldr@lemmings.world
  • @PipedLinkBot@feddit.rocks
  • @wikibot@lemmy.world
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 3.43K users / day
  • 9.11K users / week
  • 18.1K users / month
  • 38.9K users / 6 months
  • 6 local subscribers
  • 72.3K subscribers
  • 14.7K Posts
  • 583K Comments
  • Modlog
  • mods:
  • L3s@lemmy.world
  • enu@lemmy.world
  • Technopagan@lemmy.world
  • L4sBot@lemmy.world
  • L3s@hackingne.ws
  • L4s@hackingne.ws
  • BE: 0.19.11
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org