TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: How do you think the FBI gained access to would-be assassin's phone?

17 pointsby samename10 months ago
Details are scarce on what kind of phone the attacker had and how the FBI gained access to it. Source: https://www.theverge.com/2024/7/15/24199239/fbi-encryption-phone-trump-shooter-pennsylvania-gained-access

5 comments

talldayo10 months ago
Probably something like this:<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Grayshift" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Grayshift</a><p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cellebrite" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cellebrite</a>
bell-cot10 months ago
Is there any reason to suspect that Mr. Crooks had both a non-trivial password, and a model of phone with no physical_access =&gt; root weaknesses? My impression so far is that he was a very young, low-skill, and probably impulsive - all of which correlate with swiss cheese infosec.
rthnbgrredf10 months ago
No reasonable person should trust the security of an iPhone or Android when it comes to state actors. These devices likely offer sufficient protection against common theft, but they are vulnerable to sophisticated attacks from government entities.
hulitu10 months ago
Both Android and iOS are full of backdoors.<p>How do you think NGO make their living ?
评论 #40975336 未加载
middlefing10 months ago
Typed in 4 zeros for the password or borrowed his finger.
评论 #40975327 未加载