tag:blogger.com,1999:blog-1831516114336983238.post7871183337827020568..comments2024-03-23T04:19:40.135-07:00Comments on Antifascist Calling...: No Place to Hide: Internet Tracking Probe Unveiled as New Smartphone Spy Scandal UnwindsAntifascisthttp://www.blogger.com/profile/05421707682211445550noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-1831516114336983238.post-23516549788205954432011-05-20T09:50:38.829-07:002011-05-20T09:50:38.829-07:00An excelling counter measure to the forensic extra...An excelling counter measure to the forensic extraction of data from Android smart phones exists: Full device and SD card encryption via a product called WhisperCore. Right now it runs on Nexus One and Nexus S phones, with support to be added for other popular models. <br /><br />The problem of 3rd parties logging device locational and IMEI data seems a bit more difficult to solve. <br /><br />Eventually I plan to configure my phone to make all Wifi connections via VPN to a server that I control. This will at least secure my data from eavesdropping between my server and phone plus provide a measure of locational privacy.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-1831516114336983238.post-58680783198096294452011-04-25T16:44:30.193-07:002011-04-25T16:44:30.193-07:00Microdave, you're right on the points you rais...Microdave, you're right on the points you raised. The quote citing the ACLU was from Tech Herald. Looked at the UFED in more detail and it does require direct access.<br /><br />Unfortunately, if someone is actually arrested, most jurisdictions here take it as "permission" for the Five-0 to search your cell phone without a warrant.Antifascisthttps://www.blogger.com/profile/05421707682211445550noreply@blogger.comtag:blogger.com,1999:blog-1831516114336983238.post-22113611722338564002011-04-24T13:51:20.976-07:002011-04-24T13:51:20.976-07:00"The ACLU charges that the device is routine..."The ACLU charges that the device is routinely used during traffic stops and that state troopers were able to access the mobile devices without their users being aware their data was being grabbed."<br /><br />I've just downloaded the PDF instructions for the UFED, and this does not appear to be possible. It either requires direct access to the phone or SIM card, or if using Bluetooth, needs a code entering on the target device to initiate "pairing". <br /><br />Having said that, it's still a pretty nasty piece of kit...microdavehttps://www.blogger.com/profile/01352078582764696261noreply@blogger.com