From: ultred ragnusen <>
Subject: Re: The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Full headers:
From: ultred ragnusen <>
Subject: Re: The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Date: Thu, 1 Mar 2018 09:27:06 -0800
Organization: NNTP Server
Lines: 20
Message-ID: <1aum23f4mi9xw.130fuu5m3f1qd$>
References: <O3ulC.173256$mJ1.28255@fx13.fr7> <> <280220181127370843%nospam@nospam.invalid> <> <> <1u0pxuq8eh5vl$> <> <16js8xeniqzb5$.1rsedrk0gykqk$> <> <1m5t0g04z96tw.1d5oa0toqb0ev$> <> <1xxjbobasi29f.1giw1htnrfcsh$> <010320181154545437%nospam@nospam.invalid> <q02i4iqeqelw$> <010320181211446034%nospam@nospam.invalid>
NNTP-Posting-Host: t50vM/wG/8hxNQaM2XV/
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
User-Agent: 40tude_Dialog/
X-Notice: Filtered by postfilter v. 0.8.3
Print Article
Forward Article
nospam<nospam@nospam.invalid> wrote:

> for that, you need the passcode, which if it's complex, will take a few
> billion years to crack, and the imei won't help you at all,

Your entire belief system is built upon a house of cards fed to you by
Brand X marketing, admittedly one of the best marketing organizations in
the world, such that you actually seem to think that an adversary must go
frontal on your strongest link in order to obtain what they want.

As just /one/ example of how adversaries attack weak links first, read any
of the hits from this simple directed search:

To save you time, this is the first hit:

The point here is that the mobile device security is only as strong as the
set of weakest links, which are the same for all consumer grade mobile