Skip to main content

View Diary: TRIGGER WARNING: Reading this post will give you nightmares (256 comments)

Comment Preferences

  •  More is better, certainly, (1+ / 0-)
    Recommended by:
    Throw The Bums Out

    and live beats upload but if you don't ever store the password, or have the browser or app remember it, there is nothing there to extract. Obviously, you'd need to at least logout (or even shutdown) before your phone is grabbed. This may not hold true for every device, but any that would retain a web site/app password that was never intentionally stored/saved after shutdown are highly defective. And then you've got your apps that will reset the device to factory settings...

    You show a little grit and you lands in jail.

    by cal2010 on Wed Feb 20, 2013 at 11:09:03 AM PST

    [ Parent ]

    •  And do the same (1+ / 0-)
      Recommended by:
      Throw The Bums Out

      for any email associated with the video account, so dirty cop can't try "Forgot my password" feature to retrieve or reset it. Best to not even use that email account with the device at all. That should be quite sufficient to fluster Fullerton's not so finest (or equivalent) as the clip circulates.

      You show a little grit and you lands in jail.

      by cal2010 on Wed Feb 20, 2013 at 11:22:50 AM PST

      [ Parent ]

    •  Actually, they can freeze the phone to extract the (0+ / 0-)

      passwords from the device's RAM after a shutdown.  That is known as a cold boot attack as data in RAM does not disappear instantly when the power is cut and the time it takes to fade can be increased to minutes instead of just seconds if you can get the memory below freezing.

      You have watched Faux News, now lose 2d10 SAN.

      by Throw The Bums Out on Wed Feb 20, 2013 at 06:57:54 PM PST

      [ Parent ]

      •  It'd take more than standard issue equipment (0+ / 0-)

        typically available in a squad car to pull that off. Is a cop, such as those featured in this story, more likely to successfully draw and identify the relevant series of passwords off of several phones or destroy the phones in an attempt to freeze the RAM? Not saying these efforts are infeasible, but unlikely. It's only YouTube level data anyhow, not WikiLeaks worthy. Here's another approach: send off a prepared multi platform alert (SMS/email/tweet/FB update/etc.) to everyone you know alerting them to change your account password. If you can't make a secret of it, then share it all around. So it's a race. And once you've sent off the alert, smash the phone rather than hand it over. Low tech has it's uses too. Get it wet if possible. Sure, it's still recoverable but it puts a good bit of time on the clock and that's all that's needed.

        You show a little grit and you lands in jail.

        by cal2010 on Wed Feb 20, 2013 at 11:20:08 PM PST

        [ Parent ]

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site