Searching phones is a fishing expedition. They are a treasure trove of information about you, your actions, and the people you interact with. If you're being asked to unlock it, they likely already have charges against you on something else.I can't imagine having anything incriminating on my phone.
To expand on this, one finger grants access to a dummy profile while another gives access to the actual you.Somebody needs to write an app where you can store a different fingerprint, say from your left thumb or ring finger, and using it sets the wrong passcode counter to 1. Type in the wrong code, brick the phone. Oops, I was nervous
Searching phones is a fishing expedition. They are a treasure trove of information about you, your actions, and the people you interact with. If you're being asked to unlock it, they likely already have charges against you on something else.
To expand on this, one finger grants access to a dummy profile while another gives access to the actual you.
To expand on this, one finger grants access to a dummy profile while another gives access to the actual you.
This may or may not have been where the idea came from.Used to have a similar setup with an encrypted file container. One password went to one directory, the real password went to the real files.
Know your enemy I suppose. Break/Brick a phone in front of the authorities and you'll likely be in trouble. Show them something seemingly legitimate but benign and you might skate.If you really want to keep them out of your ****, brick is better than limited access, 'gooks in the wire' and all
On the topic of dummy codes... wife accidentally used the dummy code to turn off our security system.
This sounds like a fun conversation.No clue how. No clue why.
Cops showed up. She had to do some explaining and convincing that she was who she said she was.
"Interesting"? My thought was more like, "Inconceivable."
Why? This isn't about banning their phones, it is about the network that carries the traffic. Do you doubt that there is a security concern about having all of our wireless traffic traversing equipment produced in China?"Interesting"? My thought was more like, "Inconceivable."
Again, not about phonesIt would be a mostly empty gesture. Phones can spoof all sorts of things, there would be workarounds, day one.
As infrastructure for the next generation of ultra-high speed internet, known as 5G, is being developed, U.S. officials want "to move the needle" on security, a source close to the administration told Politico.
"it depends"The problem is.. what equipment ISN'T produced in China?
Is there ANY?
"it depends"
Does produced mean that all the components are produced somewhere else by companies not owned by China?
Or does it mean products have some components produced in China but the product is assembled and QA tested by a company that isn't owned by China?
In the first case it is easy to see how the devices could be modified to suit Chinese interests. The second opens the door but makes it much harder and a larger political issue if discovered.
Korea, Taiwan, Viet NamResistors and Capacitors would be okay.
But if you suspect communications equipment, then any chips produced would also be suspect.
Most American chip producers will produce limited runs. Like for prototyping, or certain limited runs of special equipment.
Who mass produces chips?
Resistors and Capacitors would be okay.
But if you suspect communications equipment, then any chips produced would also be suspect.
Most American chip producers will produce limited runs. Like for prototyping, or certain limited runs of special equipment.
Who mass produces chips?
I imagine successfully modifying a chip during the manufacturing process to do something useful and not cause obvious problems or being caught by QA to be quite difficult. I think you'd have better luck with a complete module that contained a bunch of components and likely some low level code. If chips could be modified easily I doubt foxconn would have 12 fabs located in China. Of course I wouldn't be completely surprised either.
Data center equipment run by Amazon Web Services and Apple may have been subject to surveillance from the Chinese government via a tiny microchip inserted during the equipment manufacturing process, according to a Bloomberg BusinessWeek report on Thursday. The claims in the report have been strongly disputed by the technology giants.