Highest Rated Comments


pkx6162 karma

Did you watch this movie/presentation about a guy who did a similar thing with his Mac? DEF CON 18 - Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer He had his Mac stolen, but he was able to access it remotely and get some data and pictures of the thief.

pkx6161 karma

Did you use encryption on your stolen iPhone? Did you use a sophisticated screen locking feature on the iPhone? (ie. fingerprint-based, password, long pin [5 digits or more]) Or did you use a slide-to-unlock or a simple draw-a-pattern-unlock?

I understand that the decoy Android phone was unencrypted and unlocked (screen) on purpose.

pkx6161 karma

What about the data/filesystem encryption on the iPhone? Did you use it?