The Following User Says Thank You to juiceme For This Useful Post: | ||
|
2016-02-10
, 17:06
|
Posts: 187 |
Thanked: 514 times |
Joined on Nov 2014
|
#222
|
Yes it does ...
In fact I love this cartoon...
explains things best nowadays..
but ...
from "the Christian Science Monitor" ?!?!?!
The Following 2 Users Say Thank You to MikeHG For This Useful Post: | ||
|
2016-02-10
, 18:02
|
|
Posts: 6,447 |
Thanked: 20,981 times |
Joined on Sep 2012
@ UK
|
#223
|
How many "mortal person" security issues are exactly prevented with full device encryption? Virtually the only ones I can think of are the of the "government employee with nation-wide secrets" variety, where the attackers care enough to actually desolder eMMC chips. But for those you have to take into consideration how probable it is for a government-level agency to be able to break any crypto you throw at them...
This is the reason most known "privacy-unfriendly" (*cough*) are quite happy to offer full device encryption. It thwarts almost no one.
The Following User Says Thank You to pichlo For This Useful Post: | ||
|
2016-02-10
, 18:52
|
Posts: 72 |
Thanked: 194 times |
Joined on Apr 2011
@ Norway
|
#224
|
At least this part:
Additionally, I have come into possession of a Facebook post shared with what I assume are prospective corporate customers, in which Turing's CEO claims the company has bought a manufacturing facility ("ex-Microsoft ex-Nokia") in Finland to produce its devices.
I'm not aware of any such facility been bought or sold here. Nokia's manufacturing facilities were shut down years ago and with it went big part of contractors supplying that factory. I'm not aware of any other facility here that would be ready to build such devices in mass.
The Following User Says Thank You to hhbbap For This Useful Post: | ||
|
2016-02-10
, 18:55
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#225
|
|
2016-02-10
, 19:07
|
Community Council |
Posts: 4,920 |
Thanked: 12,867 times |
Joined on May 2012
@ Southerrn Finland
|
#226
|
Ah well, @r0kk3rz beat me to it.
If you had managed to read thru the aforementioned article you'd seen that to get to the recovery console you need to input the device PIN.
Granted, you are probably able to brute-force it, given there are probably just 00000...99999 -> 100k combinations there. (I don't remember if it allows use of longer lock code...)
So, assuming you build a small HW adapter that you can use to power-down/power-up the device automatically when it halts due to 3 wrong try's, and hook it up to a script trying to force it.
Let's say you will discover it on average by the 50000's try;
If it takes about 30 seconds to boot, and you can try 3 numbers per round, you will hit the right combo in 30/3*50000 seconds, that is actually a little more than 5 days and 18 hours.
So, yes, it is breakable if you want to invest a bit into it
|
2016-02-10
, 19:23
|
|
Moderator |
Posts: 3,718 |
Thanked: 7,419 times |
Joined on Dec 2009
@ Bize Her Yer Trabzon
|
#227
|
The Following 15 Users Say Thank You to HtheB For This Useful Post: | ||
|
2016-02-10
, 20:04
|
Posts: 285 |
Thanked: 1,900 times |
Joined on Feb 2010
|
#229
|
Tags |
dave999scam, sailfish, scamfish, turing, turingphone |
|
If you had managed to read thru the aforementioned article you'd seen that to get to the recovery console you need to input the device PIN.
Granted, you are probably able to brute-force it, given there are probably just 00000...99999 -> 100k combinations there. (I don't remember if it allows use of longer lock code...)
So, assuming you build a small HW adapter that you can use to power-down/power-up the device automatically when it halts due to 3 wrong try's, and hook it up to a script trying to force it.
Let's say you will discover it on average by the 50000's try;
If it takes about 30 seconds to boot, and you can try 3 numbers per round, you will hit the right combo in 30/3*50000 seconds, that is actually a little more than 5 days and 18 hours.
So, yes, it is breakable if you want to invest a bit into it