Highest Rated Comments

pkx6162 karma

Did you watch this movie/presentation about a guy who did a similar thing with his Mac? DEF CON 18 - Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer He had his Mac stolen, but he was able to access it remotely and get some data and pictures of the thief.

pkx6161 karma

What about the data/filesystem encryption on the iPhone? Did you use it?

pkx6161 karma

Did you use encryption on your stolen iPhone? Did you use a sophisticated screen locking feature on the iPhone? (ie. fingerprint-based, password, long pin [5 digits or more]) Or did you use a slide-to-unlock or a simple draw-a-pattern-unlock?

I understand that the decoy Android phone was unencrypted and unlocked (screen) on purpose.