• Shadow@lemmy.ca
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    1
    ·
    5 months ago

    For all we know, the shooter used the same pin on his bank account as on his phone. Why are we jumping to conclusions?

    • cm0002@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      5 months ago

      It’s probably the price of a cheese pizza and a large soda back where he used to work, 1077

    • Atomic
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 months ago

      For all we know he uses his thumb to unlock it and all they had to do was walk down to the morgue.

    • ryannathans@aussie.zone
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 months ago

      Reading the article there is software that exploits 0days that can unlock practically any phone in hours

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 months ago

    This is the best summary I could come up with:


    Just two days after the attempted assassination at former President Donald Trump’s rally in Butler, Pennsylvania, the FBI announced it “gained access” to the shooter’s phone.

    Cooper Quintin, a security researcher and senior staff technologist with the Electronic Frontier Foundation, said that law enforcement agencies have several tools at their disposal to extract data from phones.

    The bureau famously butted heads with Apple in late 2015 after the company refused to help law enforcement get around the encryption on the San Bernardino, California shooter’s iPhone.

    Early in the following year, Apple refused a federal court order to help the FBI access the shooter’s phone, which the company said would effectively require it to build a backdoor for the iPhone’s encryption software.

    “The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor,” Cook wrote.

    Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory, said the Pensacola shooting was one of the last times federal law enforcement agencies loudly denounced encryption.


    The original article contains 1,208 words, the summary contains 180 words. Saved 85%. I’m a bot and I’m open source!

  • ThirdWorldOrder@lemm.ee
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    39
    ·
    5 months ago

    Oh dang the cops can see all the pictures of my kids and my shit posting over Lemmy and Reddit.

    Sound the alarm Martha! Cops are cumin’ for our phones!

    • yuri@pawb.social
      link
      fedilink
      English
      arrow-up
      28
      arrow-down
      1
      ·
      5 months ago

      When the people making the rules are the same people with supreme authority to breech your privacy, what’s to stop them from declaring anything you do as illegal? This idea of “nothing to hide, nothing to fear” is really only beneficial to power-seekers, and you’re just licking their boot by jumping on board.

      Hope it tastes cool at least.

      • ThirdWorldOrder@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        12
        ·
        5 months ago

        I’ve been in cyber security for 20 years now. I feel bad if you think the government being unable to break into your phone is the dam keeping your information private. I get your well intentions though.

        • yuri@pawb.social
          link
          fedilink
          English
          arrow-up
          18
          ·
          5 months ago

          No, it’s this pervasive idea that privacy doesn’t matter what’s got a bee in my bonnet. I would hope someone working cyber security would be especially aware that such a devil may care attitude is a short walk towards a long dystopia.