minigubben's lemmy
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
TheReturnOfPEB@reddthat.com to Privacy@lemmy.mlEnglish · 11 months ago

Magnet Graykey can provide same-day access to the latest iOS and Android devices – often in under one hour.

www.magnetforensics.com

external-link
message-square
51
fedilink
92
external-link

Magnet Graykey can provide same-day access to the latest iOS and Android devices – often in under one hour.

www.magnetforensics.com

TheReturnOfPEB@reddthat.com to Privacy@lemmy.mlEnglish · 11 months ago
message-square
51
fedilink
Magnet Graykey | Mobile forensic access tool
www.magnetforensics.com
external-link
Magnet Graykey is a forensic access tool designed for same-day, lawful access and extraction of encrypted data from mobile devices.
  • refalo@programming.dev
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    11 months ago

    Did you read the article? It doesn’t matter if you have encryption, they can break it in under a day.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      1
      ·
      11 months ago

      That’s not an article. That’s sales pitch.

      • refalo@programming.dev
        link
        fedilink
        arrow-up
        3
        arrow-down
        2
        ·
        11 months ago

        Are you implying the post title is inaccurate? If so how?

        • jet@hackertalks.com
          link
          fedilink
          English
          arrow-up
          18
          arrow-down
          1
          ·
          11 months ago

          Just look at the incentives. A company trying to sell a product is going to promise everything.

          This is not a third party review of the effectiveness of this product.

          So I do not believe sales pitches without evidence

          • refalo@programming.dev
            link
            fedilink
            arrow-up
            6
            arrow-down
            2
            ·
            11 months ago

            This is not a third party review of the effectiveness of this product.

            Since they only supply devices to law enforcement, I doubt anyone will find such a review, but I don’t think that means we should believe the product doesn’t work, at least in theory it sounds quite feasible to me. There is some information available online given by law enforcement saying that the product does work, personally I think this is enough that we should believe it does work.

            https://www.imore.com/iphone/documents-reveal-exactly-how-much-iphone-hacking-tool-graykey-costs-law-enforcement-including-subscription-costs-company-boasts-turbo-brute-force-feature-for-ios-that-can-access-locked-iphones

            https://www.imore.com/unredacted-graykey-nda-outlines-instructions-given-law-enforcement

            Yes this one is from the manufacturer but it does have more detail in how the device helped in individual cases if you are to believe what they say: https://www.grayshift.com/wp-content/uploads/101921_eb_Grayshift_AccessToTheTruth_V2-1.pdf

            • jet@hackertalks.com
              link
              fedilink
              English
              arrow-up
              6
              arrow-down
              1
              ·
              11 months ago

              Strong statements require strong evidence.

              You should always evaluate opaque claims using multiple sources that have different vested interests

              https://discuss.grapheneos.org/d/12848-claims-made-by-forensics-companies-their-capabilities-and-how-grapheneos-fares

              Vs

              https://www.theverge.com/24199357/fbi-trump-rally-shooter-phone-thomas-matthew-crooks-quantico-mdtf

              • refalo@programming.dev
                link
                fedilink
                arrow-up
                3
                ·
                11 months ago

                While I do agree with you, not everyone will agree on the authenticity of a particular source. I guess there is simply no way to be certain what their capabilities really are.

        • Todd Bonzalez@lemm.ee
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          11 months ago

          Are you implying that all Lemmy post titles are demonstrably true?

          How’s your object permanence?

    • Todd Bonzalez@lemm.ee
      link
      fedilink
      arrow-up
      4
      ·
      11 months ago

      If encryption doesn’t matter to them, then at least one of these statements must be true of every phone they unlock:

      1. The device wasn’t actually encrypted.
      2. The device was already in a decrypted state and we bypassed the screen lock and not drive encryption.
      3. We acquired the decryption keys somehow.
      4. We have technology that can break modern encryption without learning keys from another source or brute forcing.
      5. We have enough processing power to brute force a modern encryption algorithm.

      #1 and #2 are possible because government contractors lie all the time about what they actually do. Pretending to decrypt stuff isn’t outside the realm of possibility.

      #3 is the biggest concern, especially if they are able to infer what the key is by uncapping silicon or something, because that would mean that any phone that could be unlocked by this company is as good as unencrypted since the device contains the keys in a retrievable format for some reason.

      #5 and #6 are pretty much impossible, and such abilities would be far more profitable if used for just about anything but unlocking phones.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      11 months ago

      True but that isn’t a reason to give up. We need stronger encryption

Privacy@lemmy.ml

privacy@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !privacy@lemmy.ml

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

  • Lemmy.ml libre_culture
  • Lemmy.ml privatelife
  • Lemmy.ml DeGoogle
  • Lemmy.ca privacy

much thanks to @gary_host_laptop for the logo design :)

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 229 users / day
  • 2.83K users / week
  • 4.54K users / month
  • 7.39K users / 6 months
  • 1 local subscriber
  • 38.8K subscribers
  • 3.53K Posts
  • 87K Comments
  • Modlog
  • mods:
  • k_o_t@lemmy.ml
  • tmpod@lemmy.pt
  • Yayannick@lemmy.ml
  • ranok@sopuli.xyz
  • BE: 0.19.7
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org