• bloodfart@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    the fbi had to pay a third party shop a million bucks to desolder the nand and copy it so they could try every combination of passcodes to get… no useful data.

    it’s not optics when your device security requires that degree of technical skill and manpower to defeat.

    almost a decade ago.

    and you see the attack vector and take steps to mitigate it.

      • bloodfart@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        2 months ago

        Apple was identified as a participant in PRISM three years after google was and five years after Microsoft. Their cloud service (what PRISM refers specifically to) can be protected from that program by enabling Advanced Data Protection (capitalized here to indicate that such a generic name has specific meaning).

        Lifelog was officially cancelled in 2004, three years before the iPhone was released.

        I’m not sure how the email spam filter project honeypot is related to what we’re talking about.

        What are we talking about? I replied to your comment about how apple not giving a backdoor to the fbi for the San Bernardino shooters phone was optics and not a real commitment to security.

        I truly see their response as more than simply optics considering it took a one million dollar physical compromise to defeat the phones lock and apple responded to the agency’s success by moving to a system for device encryption that mitigated that hardware attack vector.

        E: lifelong -> lifelog. Thanks autocorrect

          • bloodfart@lemmy.ml
            link
            fedilink
            arrow-up
            0
            ·
            2 months ago

            Would you mind pointing me to the smartphone guide?

            It’s not a paranoia measuring contest, but I’m decently noided out as well and was never able to find conclusive links between lifelog and Facebook aside from some insanely dubious coincidences. Even the tla -> Facebook pipeline shows all the signs of simply being administrative and security state assets revolving dooring into the private sector a-la iraq 2 just like they freely move from positions within the agencies of one administration or another to the rest of aang.

            I welcome new to me information though…

            I’m no fan of cloudflares dns, but the bot aimed project honeypot never bugged me. It always seemed as benign as a function of a group that makes money off internet shit running “good” (whatever that means) can be. Feel free to pill me on cloudflare though.

            As you correctly guessed, I do own and use Apple devices, and have developed for them. I am familiar with the way the do not track system works, and it is, as the article you linked states, possible to send and receive tracking data through channels outside of it. I actually used to use lockdown privacy, the program from the authors of that study, but switched to a dns blocker.

            It’s worth noting that since att was added to ios the line was publicly that trackers would be slowly pushed out. I noticed this myself when using lockdown privacy. Over time it would block fewer and fewer trackers not because they weren’t there, but because the ways apps were allowed to classify their data would narrow.

            I’d love to see the same people do that study now. Realizing I could be fine with a simple dns blocker was why I stopped using their product!