From: ultred ragnusen <>
Subject: Re: The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Full headers:
From: ultred ragnusen <>
Subject: Re: The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
Date: Thu, 1 Mar 2018 09:48:07 -0800
Organization: NNTP Server
Lines: 26
Message-ID: <d4gn86qeb7tc$.1128mzjpwmqi$>
References: <O3ulC.173256$mJ1.28255@fx13.fr7> <> <280220181127370843%nospam@nospam.invalid> <> <> <1u0pxuq8eh5vl$> <> <16js8xeniqzb5$.1rsedrk0gykqk$> <> <1m5t0g04z96tw.1d5oa0toqb0ev$> <> <1xxjbobasi29f.1giw1htnrfcsh$> <010320181154545437%nospam@nospam.invalid> <q02i4iqeqelw$> <010320181211446034%nospam@nospam.invalid> <1aum23f4mi9xw.130fuu5m3f1qd$> <010320181237047223%nospam@nospam.invalid>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
User-Agent: 40tude_Dialog/
X-Notice: Filtered by postfilter v. 0.8.3
Print Article
Forward Article
nospam<nospam@nospam.invalid> wrote:

>> As just /one/ example of how adversaries attack weak links first, read any
>> of the hits from this simple directed search:
>> To save you time, this is the first hit:
>> st-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu
> you might want to actually *read* the links you spew.
>   If you want to keep your data secure, you only really have two viable
>   options: Heavy-duty encryption, physical security, and ideally both
>   at the same time. 
> iphones have the former and other than a confiscated phone, they also
> have the latter.
> not only that, but without the correct passcode, there won't be any
> sounds to capture it decrypting anything.

You may want to re-think your concept of "physical security" since we're
talking about /radio/ waves, where it's impossible to have physical
security of what transpires over those radio waves.