offgridk9lover2
Citizen of Zooville
No he used an 11 character oneSure, when he like most just use a 4 digit password
No he used an 11 character oneSure, when he like most just use a 4 digit password
Something like a master key or multi pass..You mean something like a master password ?
Maybe the word back door can be interpreted in different ways, but to me it is a back door if someone can enter my data without my knowledge / permission.
Hacking is usually used in the meaning that someone tries with a large number of passwords.
But as I said, a setting in an iPhone / iPad is to delete it self (like in the movies IMF - ‘selfdestruct in 5 seconds) after 10 wrong passwords or remote - using ‘Find my Phone’.
Diskdigger is on AppStore - BUTBy the way on Android the thumbnails you see in your gallery are not the same image as the photo.
They are files stored separately somewhere else. And when you "delete" the photo, the thumbnail does not necessarily have to be deleted too.
Try running DiskDigger
And see what you can get from your deleted files.![]()
DiskDigger photo/file recovery - Apps on Google Play
Recover your lost or deleted photos, videos, and other files with DiskDigger!play.google.com
I use some Disk drill to test how well some thing is deleted.By the way on Android the thumbnails you see in your gallery are not the same image as the photo.
They are files stored separately somewhere else. And when you "delete" the photo, the thumbnail does not necessarily have to be deleted too.
Try running DiskDigger
And see what you can get from your deleted files.![]()
DiskDigger photo/file recovery - Apps on Google Play
Recover your lost or deleted photos, videos, and other files with DiskDigger!play.google.com
My iPad was seized in an unrelated to this and me investigation and they hacked it six months before the suspect plead and they offered it back to me, if and only if I unlocked it for them and allowed them to make a copy, which I did, then inspected and destroyed the iPad and grenaded the appleid. So no, there are no apple backdoors (yet). Keep your iOS up to date and don’t do stupid stuff in it.yup, I do a deep crawl through the phone to secure it, now several apps don't work, why the fuck does my calendar need access to personal messages and such! I have a strict policy of nothing on my phone I wouldn't show a cop for that simple reason, as the police have tools that near intently access the phone due to back doors basically mandated, (Oh yes applies to I phone too).
not all stations are well equipped but from the few security conscious people I know who have had them taken they had all information promptly. but all so we are talking phones, not ipads hereMy iPad was seized in an unrelated to this and me investigation and they hacked it six months before the suspect plead and they offered it back to me, if and only if I unlocked it for them and allowed them to make a copy, which I did, then inspected and destroyed the iPad and grenaded the appleid. So no, there are no apple backdoors (yet). Keep your iOS up to date and don’t do stupid stuff in it.
well who knows then perhaps different laws, but if in Canada, I wouldn't trust it as far as you can throw it. that or those guys I knew used really simple but long passwords or bad settings.It’s the same os. And this was the fbi, it sat in one of their secure labs for the entire 6mo (oddly enough it connected to the internet occasionally enough to keep me updated as to its location)
If your iPad, iPhone, or whatever is stolen and hackers can unlock it, be sure, so can law enforcement... Maybe it is a legal matter; they are not allowed to..It’s the same os. And this was the fbi, it sat in one of their secure labs for the entire 6mo (oddly enough it connected to the internet occasionally enough to keep me updated as to its location)
The app *Find” functions by using the phones BlueTooth to connect with other Bluetooth devices around it, and they forwards its position through the internet. It just needs the phone is not switched off.It’s the same os. And this was the fbi, it sat in one of their secure labs for the entire 6mo (oddly enough it connected to the internet occasionally enough to keep me updated as to its location)
I have suggested that already and it is not going to happen.another approach would be if the site owners wrote a cronjob that found files in the attachment directory on the filesystem newer than the last time the job was run, then ran exiftool against each file with the commands to sanitize the exif data.