I don’t care if anyone has a Xiaomi, Oneplus, Samsung, etc. Each brand is using a modified version of Android, and they chose to be compatible with each other. But for example the “blue vs green bubble” drama is a thing specifically because of Apple locking their unsuspecting users into a closed ecosystem. And it sure isn’t Android’s fault for not being compatible with it.
The more power a company like this gains, the worse will it be for the whole industry.
cops can’t crack my iphone, but they can pop most androids instantly…
end of discussion
Shows cop a PinePhone with main partition encrypted with LUKS
i’m a big fan of pinephone and pine64…
Only if user isn’t using encryption ( which is standard these days ) or has developer mode usb debugging left open
sadly, this isn’t true:
https://en.wikipedia.org/wiki/Cellebrite
So I see a company thay duplicates phones, with no source on cracking encryption, other than their own company got hacked. And if you have a GrapheneOS phone you can shut off external USB. like connecting a cord , headset to computer does nothing unless you can login to phone and turn the USB option on.
Much of your data can just be subpoenaed and then provided to law enforcement without physical access however. Apple complies 90% of the time.
https://www.theguardian.com/technology/2022/sep/23/apple-user-data-law-enforcement-falling-short
Also, there are ways that LE can bypass your iphone’s encryption. Just doesn’t work all the time.
https://www.vice.com/en/article/4ag5yj/unlock-apple-iphone-database-for-police
GrapheneOS, based on AOSP, is really the only truly private and secure option. Android offering interoperability is not a downside and Apple having a walled garden does not mean it provides increased security. Apple is decidedly not transparent and this is ultimately not a good thing.
You’re talking about data stored in the apple cloud (I think without the account recovery turned off, but I’m not 100% on that). The same is true of googles cloud services.
Agencies haven’t been focusing on getting the actual texts that say “here I go, doing something you don’t like!” For quite a while because of the amount of variability involved. What I hear spooks talking about is building enough pc for a rubber hose interrogation with unsecured parallel data streams like push notifications.
They don’t need to. They have the keys.
NOW it’s the end of discussion.
No they definitely can.
it took “months” for the fbi to crack one iphone, that belonged to a terrorist…
and that was in 2020, those holes have long been patched.
so, no they can’t.