Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You can tell it's truly secure and private because the Cellebrite leak says they can't break it (one of very few!) and some governments assume you're a drug dealer if you use it. My next phone will run GrapheneOS.




Have a link to the source? And have they said they can’t break it, or haven’t yet? I’d imagine from a business perspective it would hardly be worth it



It could also just mean they haven't bothered try

Their marketing slides include GOS, and they have since 2021 I think was just said "can't access that".

I would imagine it's a very high priority if you have powerful targets. They're not gonna be running an off-the-shelf android phone.

Considering they mention it on their marketing materials, they definitely did bother

Marketing is known to lede a lot of bullshit. Celebrite saying "We tried our stuff and it didn't work" is very likely more about obscurity than focused effort. Unless you know that celebrite has been specifically hired to break into a GrapheneOS device and put as much effort into it as they do into standard Android and iOS and failed, it means nothing. It's like the old thing about MacOS 9 being more secure than Windows.

Does the Celebrite leak say out can break recent iOS?

Don't worry, Apple can do it themselves as they have full remote access

Source:

The source is Apple. They can access any phone if they want to. In this case, they didn't want to.

https://en.wikipedia.org/wiki/Apple%E2%80%93FBI_encryption_d...


I don't see anything written there that says Apple has a current capability to "access any phone" which I am assuming to mean personal info like SMS message contents... just a whole lot of reasoning why they haven't had that capability in years.

They are literally in PRISM you fucking idiot. But hey, go ahead. Be ignorant, believe what they say and their marketing team which has been deceiving normies since forever



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: