this post was submitted on 16 Jul 2024
312 points (95.6% liked)

Technology

59287 readers
4447 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] GamingChairModel@lemmy.world 10 points 3 months ago (1 children)

Stingrays don't do shit for this. That's mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn't get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone's Internet traffic is encrypted from the ISP.

The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

[–] umbrella@lemmy.ml 4 points 3 months ago (1 children)

stingrays can compromise a phone through modem exploits, and pull data from there.

though not all of them are made equal, they are an entire category of devices.

[–] GamingChairModel@lemmy.world 3 points 3 months ago

Oh damn, just read about these baseband exploits. Ok, you've changed my mind.