Highest Rated Comments
pkx6161 karma
Did you use encryption on your stolen iPhone? Did you use a sophisticated screen locking feature on the iPhone? (ie. fingerprint-based, password, long pin [5 digits or more]) Or did you use a slide-to-unlock or a simple draw-a-pattern-unlock?
I understand that the decoy Android phone was unencrypted and unlocked (screen) on purpose.
pkx6162 karma
Did you watch this movie/presentation about a guy who did a similar thing with his Mac? DEF CON 18 - Zoz - Pwned By The Owner: What Happens When You Steal A Hacker's Computer He had his Mac stolen, but he was able to access it remotely and get some data and pictures of the thief.
View HistoryShare Link