Skip to main content

View Diary: TRIGGER WARNING: Reading this post will give you nightmares (256 comments)

Comment Preferences

  •  Actually, they can freeze the phone to extract the (0+ / 0-)

    passwords from the device's RAM after a shutdown.  That is known as a cold boot attack as data in RAM does not disappear instantly when the power is cut and the time it takes to fade can be increased to minutes instead of just seconds if you can get the memory below freezing.

    You have watched Faux News, now lose 2d10 SAN.

    by Throw The Bums Out on Wed Feb 20, 2013 at 06:57:54 PM PST

    [ Parent ]

    •  It'd take more than standard issue equipment (0+ / 0-)

      typically available in a squad car to pull that off. Is a cop, such as those featured in this story, more likely to successfully draw and identify the relevant series of passwords off of several phones or destroy the phones in an attempt to freeze the RAM? Not saying these efforts are infeasible, but unlikely. It's only YouTube level data anyhow, not WikiLeaks worthy. Here's another approach: send off a prepared multi platform alert (SMS/email/tweet/FB update/etc.) to everyone you know alerting them to change your account password. If you can't make a secret of it, then share it all around. So it's a race. And once you've sent off the alert, smash the phone rather than hand it over. Low tech has it's uses too. Get it wet if possible. Sure, it's still recoverable but it puts a good bit of time on the clock and that's all that's needed.

      You show a little grit and you lands in jail.

      by cal2010 on Wed Feb 20, 2013 at 11:20:08 PM PST

      [ Parent ]

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site