There is nothing extremely hard about unlocking someone's phone, yeah it isn't as easy as one might think. But there are always backdoors.even for pros ,i doubt hizbullah have a grey box
unlocking an iphone was extremely hard even for FBI
you are comparing two different thingsThere is nothing extremely hard about unlocking someone's phone, yeah it isn't as easy as one might think. But there are always backdoors.
Let me remind you of the incident that happened a couple of years ago when iCloud was hacked.
you dont look like you have any experience when you compare the flaw in a cloud service to that of a physical phone .Two different things? how are those two different things?
I work in IT and I do read a lot, so I do have "some" experience in this matter.
It seems YOU don't really know what you are talking about, because you think the physical phone isn't connected to the cloud service.you dont look like you have any experience when you compare the flaw in a cloud service to that of a physical phone .
anyway who gives a **** .. i hope Lebanon burns
Those who are asking you to isolate 30% of your population are the ones dividing the people.I find it hilarious that people are taking glee in fabricating stories and spreading rumors about this woman being an Israeli agent. I'd be more concerned with the Syrian and Iranian agents among us that take pleasure in dividing the Lebanese people and work against every tenet of democracy.
Yes what an odd reaction. Most people celebrate when their phones get stolenThere is a word in the streets (Internet) that a lot of things will be exposed by her phone....
I believe she is a hater, a conspirator and evil person....
But this is my opinion, what will be found in her phone is the true question...
Should I predict this thread is the one that will be like <<WhatsAPP>> thread that I predicted will be a great
thing to Lebanon?!!
Lets wait and see.
Add to that you need to encrypt your SD card as well.Can we just make the difference between:
A- Bypassing a screenlock
B- Bypassing a screenlock and decrypting the data
A- is simple as you have a limited number of combinations and it is just a measure to protect your phone from your girlfriend finding out you downloaded tinder.
B- Includes A but it is actually protecting important data on your phone from a higher level attack that is more difficult to crack but nevertheless feasable due to everyone searching and buying high performance phones (the tougher the encryption to crack the more secure but the more time it takes even with the key). Encrypting phone data is an option (at least on android here is a link for all those interested : How to Encrypt Your Android Device – A Step-by-Step Guide - Pixel Privacy ) doing this will definitely make your phone slower and IT companies usually make you download a third party secApps to add an extra layer when you want to use it for work email/accessing customer data.
An encrypted or not phone's data can be copied in several ways and cold decryption/cracking is something as you can use overpowered processors to crack an encryption designed to run on a weak/battery efficient/small processor ....doing so will accelerate the process.
In short encrypt your phones but most importantly have good security reflexes like not setting all your alternate emails on your personal main email address, do not keep compromising data on it and do not do what she did flaunting it around in the middle of the streets when clearly she was a target...hold your phone tightly and make the timeout as short as possible....learn how to lock and erase your phone from a distance and practice all of this so if it happens you are ready to act in the 30minutes following (as was mentioned by @Danny Z )
Physical access to an electronic device puts all security measures at risk and that is why data servers are generally protected by armed guards (when legal) and have high security protocols on who is in and out...