Final on Nostr: Tools like these are used in unlawful search and seizures and in border crossings. ...
Tools like these are used in unlawful search and seizures and in border crossings. They're called forensic kits because they're supposed to be designed to extract device data as forensically sound evidence that can't be tampered with.
The companies are very capable actors that design zero-day exploits, even if their targeting is limited, allowing some company to use exploits and not patch them is unacceptable for us. Other OEMs like Samsung should be humiliated for not trying hard enough. Apple followed us in adding an automatic reboot but we'd want more and Google should add more of the suggestions from us.
This is slightly below something like mercenary spyware but as businesses they both function the same, selling a way to hack a device for money. Intelligence agencies go above both and they would seek something bespoke.
If someone could be $5 wrenched, get rid of the phone or data. No data is worth your life. You're better to post all that data to someone or publicise whatever you was whistleblowing.
The companies are very capable actors that design zero-day exploits, even if their targeting is limited, allowing some company to use exploits and not patch them is unacceptable for us. Other OEMs like Samsung should be humiliated for not trying hard enough. Apple followed us in adding an automatic reboot but we'd want more and Google should add more of the suggestions from us.
This is slightly below something like mercenary spyware but as businesses they both function the same, selling a way to hack a device for money. Intelligence agencies go above both and they would seek something bespoke.
If someone could be $5 wrenched, get rid of the phone or data. No data is worth your life. You're better to post all that data to someone or publicise whatever you was whistleblowing.