Have an iPhone? Do this one thing right before picking up your pack..

If you're an iPhone user - don't be fooled by the news telling you that LE can't get into your phone. Apple is simply 'not assisting them' anymore. . All they need is your phone, and any computer (encrypted or not) that the phone has ever connected to, in order to get all of your online accounts, etc. on federal levels, they now have federal unlock utility. . Only caviat to their being able to utilize either of these two methods? If your phone has been unlocked after a restart. . Reboot your iPhone right before walking into the PO office - and do not unlock it with your password upon restart. That's the only way to ensure that they cannot get in without your password :)


Comments


[6 Points] honestlyimeanreally:

Not that I don't believe you but where do you gather this information from?


[5 Points] mdmamaniac:

What about an android?


[3 Points] None:

[deleted]


[3 Points] CertifiedCrypto:

here's one source I found quickly. look at last paragraph


[1 Points] Renvyus:

Is there anything you can do to encrypt your iPhone? Any tweaks you can download with a jailbroken phone?


[1 Points] afiendinneed:

thanks!


[1 Points] TheLastCig:

How does everyone feel about using the blockchain app on your personal iPhone that you use every day. Or lets say even as far as using the my.usps website to track your packs from your phone? What about buying BTC from your phone? As stupid as all of these things sound for good OPSEC, I'm betting theres plenty of people who do all of these on the regular.. who will admit to it? :)


[1 Points] noonehear:

But I keep all my deepest darkest secrets locked into my iPhone!!

Seriously what does it matter what you have on your phone... it should be clean! You do carry it everywhere afterall....

Your plan is not failure proof. McAfee's idea (via the San Bernardino shooter who HAD NOTHING OF VALUE ON HIS PHONE) of cloning the memory a few million times and brute forcing the clones (oh noooz I lost copy #943,832,939 after 10 unsucessful logins... better move onto the next copy and now we know that these 10 pins ARE NOT the unlock pin) until you get the pin will work after a long wait...


[1 Points] noonehear:

I heard smashing it into pieces in the parking lot and then lighting it on fire works just as well. Anyone have any first hand experience?


[1 Points] Daseetmane:

I use telegram(same app ISIS uses to coordinate their attacks) to talk about drugs, good luck to them on getting in to it (password protected) and I doubt Russians would be willing to cooperate with with whatever LE agency wants to get in to it.


[1 Points] mxe_grill_cheese_god:

+1 for burner phone


[1 Points] CertifiedCrypto:

I would.


[1 Points] None:

If you buy a generic phone that requires no ID then how do they ever tie it to you in a time frame that is not months?

Is this info only for large scale dealers who are being actively watched?

If so then for them taking a break is the only solution that could work & I say could because they may already have enough info.

For the rest of us who order a couple grams for medicinal purposes to be consumed at will in the privacy of our own home, is this discussion not a little over the top?

Encryption of any type is not as simple to break as what is being stated here. I work with computers an have done for 25 years. I am yet to see a tech overcome the find my phone lock let alone encryption.

How many here successfully break encryption without much effort?


[1 Points] CertifiedCrypto:

Sure, if you don't mind it being seized & searched? In a CD, they're going to search your vehicle and everything in it. Have a home address on your ID? That'll be searched, too. Any and all until they have what they came for :) just clean house, (and car) and shut the fuck up & lawyer up. You'll be golden.


[1 Points] PeeturDoinkleburg:

One key difference between Android phones and Apple is the ability to JTAG. My understanding is that the JTAG pinout is too small to make iPhones a successful target. Honestly, the best way is to devise a method to fry the motherboard along with all attached components (including SD). I know, not entirely feasible in most situations. I know that.

A lot of software wizardry can be defeated at a hardware level. Do not throw your phone into a river, please. This would be like throwing a Sacajawea Dollar coin into a wishing well and wishing to spend time in prison. Even wishing wells hate those coins, not because of some dislike of Native Americans, but because vending machines do not accept these coins. It's frustrating.


[1 Points] PeeturDoinkleburg:

And nobody here mentioned stingrays either? Huh.


[1 Points] CertifiedCrypto:

Warrant doesn't exclude probable cause, though. It's PC to expect that there person getting this _____ sent to them also has other drugs in his possession - so they will use that as PC to get your vehicle. Also? Most CDs now are done by letting you take it and then just pull you over. That's also gives them PC. One thing that I don't know that I wish I could figure out; is if you're getting it delivered to a private mailboxes,etc type thing - would they search your actual home address that is on girl w the postal place? Never could find anything about that. Though the vehicle thing has been proven by many busted vendors/buyers.


[0 Points] None:

[deleted]