We found the assassin's connections through our in-depth analysis of mobile ad data to track movements of Crooks and his associates... :marseyschizowave:

https://twitter.com/OversightPR/status/1815446054428352591

!nooticers :marseyschizowall:

https://i.rdrama.net/images/17216769285456154.webp https://i.rdrama.net/images/17216769287468085.webp https://i.rdrama.net/images/17216769289183154.webp https://i.rdrama.net/images/17216769290495188.webp

https://i.rdrama.net/images/172167692920477.webp https://i.rdrama.net/images/17216769293691504.webp https://i.rdrama.net/images/17216769295427985.webp

69
Jump in the discussion.

No email address required.

!codecels

Yall make fun of me for locking my phone down to the point of almost uselessness but at least I ain't getting tracked 24/7

Jump in the discussion.

No email address required.

the assassin was an r-slur. If he just powered off his phone completely the FBI would be SOL.

basically iPhones use full disk encryption with on-demand decryption, this means that while your phone is off, your encryption key is isn't in memory. At this point, the phone is considered "cold", and retrieving the encryption key is impossible. Once you turn on your phone AND enter your passcode, the encryption key is moved to memory, making the phone "hot" (this is why you cant use biometrics after booting an iPhone), and using some jewish trickery, they were able to retrieve the encryption key from memory.

(i read like two articles so theres a good chance im wrong :marseysmoothbrain: )

tldr, iphones are incredibly safe, but you need to not be an r-slur

Jump in the discussion.

No email address required.

his phone

Which was a Samsung btw

https://i.imgur.com/6IE3dFj.jpeg

Jump in the discussion.

No email address required.

im pretty sure samsung also uses full disk encryption with on-demand decryption

Jump in the discussion.

No email address required.

Default iPhone passwords are 6 numbers now. Even with an expensive key derivation function that's literal childs play for glowies even if they have to use chinese trickery to extract some data off the mobo.

Jump in the discussion.

No email address required.

Doesn't the lockout time between tries increase exponentially?

Jump in the discussion.

No email address required.

Lockout doesn't matter. It's the actual mapping of an insecure password, a 6 number string, to a cryptographic key. You can have some long derivation function, some state on the mobo, some operations that occur on hardware, etc... But if that state can be extracted the key can be derived. There's some deep glowie history with phone security, and the entire push from passwords to biometrics is because then they don't violate the 5th amendment with they force scan your face to unlock.

Jump in the discussion.

No email address required.

Just maim your own face before they catch you so they can't force scan it :marseytroublemaker:

Jump in the discussion.

No email address required.

I always wear my TayTay facemask :marseykink: to unlock my phone. Glowies can try as the might, my dear old mug isnt gonna unlock my phone

Jump in the discussion.

No email address required.

I have worked in this area and the software they use does indeed circumvent a "lockout", but it still brute forces the password on the device. A 6 digit password is pretty easily cracked, but anything longer and alphanumeric can take months. This applies to both Android and iOS

Jump in the discussion.

No email address required.

If he just powered off his phone completely the FBI would be SOL.

I'm 99% sure that the tool they used can also unlocked a cold phone (at least the model he had)

Wasn't he using android? One of us is def r-slurred here

Jump in the discussion.

No email address required.

Yup, a Samsung

https://i.imgur.com/6IE3dFj.jpeg

Jump in the discussion.

No email address required.

he was using an android :marseyspecial: but it works the same way

if its an older model i think they can use some zero day frickery to get the encryption key but idk im a lot less confident about this than i was 2 hours ago

Jump in the discussion.

No email address required.

Just remember that even though Google and/or Apple have this kind of data, that's probably not where the poster got it.

People install shit like random third-party weather apps then grant them location permissions for the convenience of not selecting where they want their forecast (even though they generally live in the same area and could easily set it via zip code). Whenever they do this, the weather app collects as many GPS data points as it can and sells them to random advertisers. You can buy this data yourself if you want.

tldr: almost certainly the result of r-slurs giving their data away to third parties

Jump in the discussion.

No email address required.

You're still getting tracked. The phone companies themselves sell your location data.

Jump in the discussion.

No email address required.

>thinking i leave my sim card in

Jump in the discussion.

No email address required.

>he thinks SIM cards matter

>he doesn't know about IMEIs

:#turtoiserofl:

Neighbor your cellular modem glows 24/7 with the local towers.

Jump in the discussion.

No email address required.

Pwease teww mwe hwow two dwo the same 🙏🏿🙏🏿

Jump in the discussion.

No email address required.

Install lineage OS and AFWall+, block everything by default and only add the apps you actually use

Jump in the discussion.

No email address required.

Any tip fwor iPhwonye peasants?

Jump in the discussion.

No email address required.

I haven't used an iphone sice the 4s was new, no idea

Jump in the discussion.

No email address required.

Shit outta luck.

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.