317
submitted 9 months ago by jeffw@lemmy.world to c/technology@lemmy.world
top 50 comments
sorted by: hot top controversial new old
[-] Chozo@fedia.io 108 points 9 months ago

Without knowing how they got into his phone, this is a non-story that is just a retelling of older stories. For all we know they just took his dead finger and put it on the reader. Or maybe he used the same 4-digit PIN for his debit card or lock box or something else that they were able to recover. Maybe some detective just just randomly entered the shooter's birthday, only to say "Hey sarge, you're never gonna believe this... first try!"

There's nothing useful that can be taken away from this story yet, until more details come out.

[-] glowie@h4x0r.host 19 points 9 months ago

Or unknown NGO software was used. But you're right. A nothing burger for now.

[-] xnx@slrpnk.net 3 points 9 months ago

Using a dead persons finger is not possible though

[-] Chozo@fedia.io 19 points 9 months ago

I don't see why it wouldn't be. It just checks that the shape of the fingerprint is there, it doesn't check for a pulse or any sign of life. If you have a high-enough resolution image and printer, it's actually rther trivial to bypass most optical fingerprint readers.

load more comments (4 replies)
[-] TheReturnOfPEB@reddthat.com 106 points 9 months ago* (last edited 9 months ago)

Our local sheriff is using some spy level shit in our county that he refuses to explain.

He keeps "happening" upon crimes just "on accident." yesterday it was "stopped to take a pee in public park and caught a baddie" and two days before that it was "just happen to follow and pull over a guy with lots of pounds of pot hidden in the car."

The US police are spying on Americans phones, internet, GPS, and everything with no judicial recourse because it is corporations spying and then "giving the info" to the police for money.

The US law enforcement has gone full STAZI but using capitalism as additional cover.

The US is dead.

[-] rottingleaf@lemmy.world 40 points 9 months ago

Let's all apologize to Stallman.

[-] demonsword@lemmy.world 15 points 9 months ago

the man has rarely been proven wrong in anything tech related he has said

[-] TimeSquirrel@kbin.melroy.org 12 points 9 months ago

Good thing you put the "tech related" qualifier on there. He probably should have stayed in that lane.

load more comments (2 replies)
[-] USSEthernet@startrek.website 20 points 9 months ago

They're probably just capturing SMS messages or regular calls. Which is still illegal without a warrant, but who watches the watchers? Use encrypted chats and encrypted calls if you're worried.

[-] remer@lemmy.world 19 points 9 months ago
load more comments (1 replies)
[-] Maggoty@lemmy.world 10 points 8 months ago

That's also a red flag for a dirty cop getting information from criminal group A to go after competition.

You should probably move.

[-] xnx@slrpnk.net 3 points 9 months ago

Do you have an article on this?

[-] bdonvr@thelemmy.club 30 points 9 months ago

Good chance it was just putting the dead dudes finger on the scanner lmao

[-] xnx@slrpnk.net 3 points 9 months ago
[-] bdonvr@thelemmy.club 15 points 9 months ago* (last edited 9 months ago)

Unless disabled by timeout, restart, or otherwise manually I'm curious to know why that would be?

Of course the dude had to know this was a one way trip, I'd have wiped everything but then again maybe they didn't care at that point.

[-] willsenior@lemm.ee 4 points 9 months ago

It is hit or miss. The fingerprint button is also looking for the electrical signals of a living person. Apparently, that doesn't end immediately upon death.

[-] BigFatNips@sh.itjust.works 14 points 9 months ago

Source? Sounds like scifi movie stuff to me, but I'd be interested to read/see more about it

[-] CoolGirl586@lemmy.world 5 points 8 months ago* (last edited 8 months ago)

Your body doesn't all die at once. The parts that need a constant flow of oxygen die within minutes, while some parts take hours. Tissues like skin, tendons and heart valves are viable for harvest for as long as 48 hours after death.

https://australian.museum/about/history/exhibitions/death-the-last-taboo/decomposition-body-changes/

I don't know how long a fingerprint would work after death though. I imagine it depends on the type of scanner. An optical scanner would probably not care. I'm not sure about ultrasonic. Thermal and capacitive would probably stop working within minutes of death.

[-] BigFatNips@sh.itjust.works 4 points 8 months ago* (last edited 8 months ago)

Lol not that. I'm well aware of that. I meant a source for "fingerprint readers are looking for an electrical signal too" as I'm very sure I've heard about them being defeated with a high enough quality reproduction of the finger (read: not flesh at all, let alone alive)

[-] CoolGirl586@lemmy.world 3 points 8 months ago

Oh, I did a dumb. Capacitive readers use the body's natural electrical signal to form an image of your fingerprint. You can trick them by using something conductive and running the right amount of electricity through.

Dead people don't work though. Not for very long at least.

[-] piecat@lemmy.world 6 points 8 months ago

Capacitive sensors don't measure the body's signals. Capacitance is a physical property of a material. The sensor puts out a signal and measures the response.

I can use a gallon of milk to scroll my phone. Just tried.

load more comments (1 replies)
load more comments (1 replies)
[-] uriel238 27 points 8 months ago

It's always a contest between security tools and penetration tools. The problem comes when law enforcement can do this without fair protections of privacy, say if they can easily establish probable cause ( My detection dog is signalling you have illegal data on your phone ) or they are allowed to get a warrant post-hoc for an otherwise illegal search.

...Or they do the illegal search and then engage in parallel reconstruction e.g. make a fake story about following up on an informant.

Once the police just seize and crack your phone on a whim, then the state no longer respects your privacy and autonomy, which means you can no longer consent to be governed, rather are controlled by gunpoint (surveillance and use of force). This is one of the critical ingredients to autocratic rule, since it does a lot to neuter the capacity of discontent turning into revolt.

[-] anlumo@lemmy.world 27 points 9 months ago

I’m pretty sure it used to be easier with phones that didn’t have full disk encryption.

[-] umbrella@lemmy.ml 14 points 9 months ago

stingrays, people.

they sell the exploits and are all hush hush about it.

[-] GamingChairModel@lemmy.world 9 points 9 months ago

Stingrays don't do shit for this. That's mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn't get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone's Internet traffic is encrypted from the ISP.

The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

[-] umbrella@lemmy.ml 4 points 9 months ago

stingrays can compromise a phone through modem exploits, and pull data from there.

though not all of them are made equal, they are an entire category of devices.

[-] GamingChairModel@lemmy.world 3 points 8 months ago

Oh damn, just read about these baseband exploits. Ok, you've changed my mind.

load more comments (1 replies)
[-] Maggoty@lemmy.world 9 points 8 months ago

This is the would be assassin's phone.

They gave that to the NSA or FBI Counter Intel guys who are hooked in with NSA.

Your phone is not going there.

However I would be on the lookout for that tech coming down the pipelines.

[-] autotldr@lemmings.world 6 points 9 months ago

This is the best summary I could come up with:


Just two days after the attempted assassination at former President Donald Trump’s rally in Butler, Pennsylvania, the FBI announced it “gained access” to the shooter’s phone.

Cooper Quintin, a security researcher and senior staff technologist with the Electronic Frontier Foundation, said that law enforcement agencies have several tools at their disposal to extract data from phones.

The bureau famously butted heads with Apple in late 2015 after the company refused to help law enforcement get around the encryption on the San Bernardino, California shooter’s iPhone.

Early in the following year, Apple refused a federal court order to help the FBI access the shooter’s phone, which the company said would effectively require it to build a backdoor for the iPhone’s encryption software.

“The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor,” Cook wrote.

Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory, said the Pensacola shooting was one of the last times federal law enforcement agencies loudly denounced encryption.


The original article contains 1,208 words, the summary contains 180 words. Saved 85%. I'm a bot and I'm open source!

[-] communism@lemmy.ml 5 points 8 months ago

For GrapheneOS full disk encryption, am I correct in understanding that the disk is encrypted when my phone is locked and decrypted when I unlock it? So I don't need to turn it off for it to be encrypted, as long as it's locked it's encrypted?

[-] randomaccount43543@lemmy.world 5 points 9 months ago

Do they say what phone it was?

[-] chemicalwonka@discuss.tchncs.de 5 points 8 months ago

Can they access Pixel 8 with GrapheneOS? I think not

[-] UnsavoryMollusk@lemmy.world 3 points 8 months ago

Depends, is your bootloader unlocked ?

[-] chemicalwonka@discuss.tchncs.de 3 points 8 months ago* (last edited 8 months ago)

Locked and USB-C Off on firmware level

[-] sfxrlz@lemmy.world 5 points 8 months ago

Paid by everybodies taxes™️

[-] mechoman444@lemmy.world 5 points 8 months ago

Never keep anything on your phone that would require you to lock it.

I've never locked my phone.

[-] explodicle@sh.itjust.works 4 points 8 months ago

It's true, I have their mom's phone number.

[-] mechoman444@lemmy.world 4 points 8 months ago

Son of a bitch! Stop calling so late!

[-] sturmblast@lemmy.world 4 points 9 months ago

Don't do illegal things on your phone :)

[-] dumbass@leminal.space 11 points 9 months ago
[-] ivanafterall@lemmy.world 6 points 9 months ago

THAT'S MY PURSE! I DON'T KNOW YOU!

[-] uriel238 3 points 8 months ago

Good luck with that. The CFAA was written when Reagan was spooked by Wargames in 1982. If you violate any TOS of websites you use (very easy to do) it can be prosecuted as a federal felony with a maximum sentence of 25 years imprisonment.

If the police really want you to disappear into the penal system, they'll make it happen. And they do, routinely.

[-] TheReturnOfPEB@reddthat.com 4 points 8 months ago

A 2020 investigation by the Washington, DC-based nonprofit organization Upturn found that more than 2,000 law enforcement agencies in all 50 states and the District of Columbia had access to mobile device forensic tools (MDTFs).

load more comments
view more: next ›
this post was submitted on 16 Jul 2024
317 points (100.0% liked)

Technology

68599 readers
3273 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS