• @[email protected]
    link
    fedilink
    English
    105 months ago

    Stingrays don’t do shit for this. That’s mostly real time location data focused in by tricking your phone into reporting its location to a fake cell tower controlled by an adversary. That doesn’t get into the data in your phone, and even if someone used the fake tower to man in the middle, by default pretty much all of a phone’s Internet traffic is encrypted from the ISP.

    The world of breaking disk encryption on devices is a completely different line of technology, tools, and techniques.

    • @[email protected]
      link
      fedilink
      English
      45 months ago

      stingrays can compromise a phone through modem exploits, and pull data from there.

      though not all of them are made equal, they are an entire category of devices.