minigubben's lemmy
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
TheReturnOfPEB@reddthat.com to Privacy@lemmy.mlEnglish · 11 months ago

Magnet Graykey can provide same-day access to the latest iOS and Android devices – often in under one hour.

www.magnetforensics.com

external-link
message-square
51
fedilink
92
external-link

Magnet Graykey can provide same-day access to the latest iOS and Android devices – often in under one hour.

www.magnetforensics.com

TheReturnOfPEB@reddthat.com to Privacy@lemmy.mlEnglish · 11 months ago
message-square
51
fedilink
Magnet Graykey | Mobile forensic access tool
www.magnetforensics.com
external-link
Magnet Graykey is a forensic access tool designed for same-day, lawful access and extraction of encrypted data from mobile devices.
  • refalo@programming.dev
    link
    fedilink
    arrow-up
    5
    arrow-down
    2
    ·
    11 months ago

    Welp, encryption is optional boys and girls.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      11 months ago

      No it isn’t as it is the default and can not be turned off (that’s good)

      • refalo@programming.dev
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        11 months ago

        Did you read the article? It doesn’t matter if you have encryption, they can break it in under a day.

        • jet@hackertalks.com
          link
          fedilink
          English
          arrow-up
          16
          arrow-down
          1
          ·
          11 months ago

          That’s not an article. That’s sales pitch.

          • refalo@programming.dev
            link
            fedilink
            arrow-up
            3
            arrow-down
            2
            ·
            11 months ago

            Are you implying the post title is inaccurate? If so how?

            • jet@hackertalks.com
              link
              fedilink
              English
              arrow-up
              18
              arrow-down
              1
              ·
              11 months ago

              Just look at the incentives. A company trying to sell a product is going to promise everything.

              This is not a third party review of the effectiveness of this product.

              So I do not believe sales pitches without evidence

              • refalo@programming.dev
                link
                fedilink
                arrow-up
                6
                arrow-down
                2
                ·
                11 months ago

                This is not a third party review of the effectiveness of this product.

                Since they only supply devices to law enforcement, I doubt anyone will find such a review, but I don’t think that means we should believe the product doesn’t work, at least in theory it sounds quite feasible to me. There is some information available online given by law enforcement saying that the product does work, personally I think this is enough that we should believe it does work.

                https://www.imore.com/iphone/documents-reveal-exactly-how-much-iphone-hacking-tool-graykey-costs-law-enforcement-including-subscription-costs-company-boasts-turbo-brute-force-feature-for-ios-that-can-access-locked-iphones

                https://www.imore.com/unredacted-graykey-nda-outlines-instructions-given-law-enforcement

                Yes this one is from the manufacturer but it does have more detail in how the device helped in individual cases if you are to believe what they say: https://www.grayshift.com/wp-content/uploads/101921_eb_Grayshift_AccessToTheTruth_V2-1.pdf

                • jet@hackertalks.com
                  link
                  fedilink
                  English
                  arrow-up
                  6
                  arrow-down
                  1
                  ·
                  11 months ago

                  Strong statements require strong evidence.

                  You should always evaluate opaque claims using multiple sources that have different vested interests

                  https://discuss.grapheneos.org/d/12848-claims-made-by-forensics-companies-their-capabilities-and-how-grapheneos-fares

                  Vs

                  https://www.theverge.com/24199357/fbi-trump-rally-shooter-phone-thomas-matthew-crooks-quantico-mdtf

                  • refalo@programming.dev
                    link
                    fedilink
                    arrow-up
                    3
                    ·
                    11 months ago

                    While I do agree with you, not everyone will agree on the authenticity of a particular source. I guess there is simply no way to be certain what their capabilities really are.

            • Todd Bonzalez@lemm.ee
              link
              fedilink
              arrow-up
              1
              arrow-down
              1
              ·
              11 months ago

              Are you implying that all Lemmy post titles are demonstrably true?

              How’s your object permanence?

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          11 months ago

          True but that isn’t a reason to give up. We need stronger encryption

        • Todd Bonzalez@lemm.ee
          link
          fedilink
          arrow-up
          4
          ·
          11 months ago

          If encryption doesn’t matter to them, then at least one of these statements must be true of every phone they unlock:

          1. The device wasn’t actually encrypted.
          2. The device was already in a decrypted state and we bypassed the screen lock and not drive encryption.
          3. We acquired the decryption keys somehow.
          4. We have technology that can break modern encryption without learning keys from another source or brute forcing.
          5. We have enough processing power to brute force a modern encryption algorithm.

          #1 and #2 are possible because government contractors lie all the time about what they actually do. Pretending to decrypt stuff isn’t outside the realm of possibility.

          #3 is the biggest concern, especially if they are able to infer what the key is by uncapping silicon or something, because that would mean that any phone that could be unlocked by this company is as good as unencrypted since the device contains the keys in a retrievable format for some reason.

          #5 and #6 are pretty much impossible, and such abilities would be far more profitable if used for just about anything but unlocking phones.

Privacy@lemmy.ml

privacy@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !privacy@lemmy.ml

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

  • Lemmy.ml libre_culture
  • Lemmy.ml privatelife
  • Lemmy.ml DeGoogle
  • Lemmy.ca privacy

much thanks to @gary_host_laptop for the logo design :)

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 229 users / day
  • 88 users / week
  • 4.54K users / month
  • 7.39K users / 6 months
  • 1 local subscriber
  • 38.8K subscribers
  • 3.53K Posts
  • 87K Comments
  • Modlog
  • mods:
  • k_o_t@lemmy.ml
  • tmpod@lemmy.pt
  • Yayannick@lemmy.ml
  • ranok@sopuli.xyz
  • BE: 0.19.7
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org