• anlumo@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    1
    ·
    1 year ago

    I’m pretty sure it used to be easier with phones that didn’t have full disk encryption.

    • GamingChairModel@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      Stingrays don’t do shit for this. That’s mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn’t get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone’s Internet traffic is encrypted from the ISP.

      The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

  • Maggoty@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 year ago

    This is the would be assassin’s phone.

    They gave that to the NSA or FBI Counter Intel guys who are hooked in with NSA.

    Your phone is not going there.

    However I would be on the lookout for that tech coming down the pipelines.

  • communism@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    For GrapheneOS full disk encryption, am I correct in understanding that the disk is encrypted when my phone is locked and decrypted when I unlock it? So I don’t need to turn it off for it to be encrypted, as long as it’s locked it’s encrypted?