There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

Chozo ,

Without knowing how they got into his phone, this is a non-story that is just a retelling of older stories. For all we know they just took his dead finger and put it on the reader. Or maybe he used the same 4-digit PIN for his debit card or lock box or something else that they were able to recover. Maybe some detective just just randomly entered the shooter's birthday, only to say "Hey sarge, you're never gonna believe this... first try!"

There's nothing useful that can be taken away from this story yet, until more details come out.

glowie ,
@glowie@h4x0r.host avatar

Or unknown NGO software was used. But you’re right. A nothing burger for now.

Eggyhead ,

I’m super curious how they got into his phone

admin ,
@admin@lemmy.my-box.dev avatar

I think you’ll get to hold on to that feeling.

0x0 ,

they just took his dead finger and put it on the reader.

My bet’s on this.

TheReturnOfPEB ,

Our local sheriff is using some spy level shit in our county that he refuses to explain.

He keeps “happening” upon crimes just “on accident.” yesterday it was “stopped to take a pee in public park and caught a baddie” and two days before that it was “just happen to follow and pull over a guy with lots of pounds of pot hidden in the car.”

The US police are spying on Americans phones, internet, GPS, and everything with no judicial recourse because it is corporations spying and then “giving the info” to the police for money.

The US law enforcement has gone full STAZI but using capitalism as additional cover.

The US is dead.

rottingleaf ,

Let’s all apologize to Stallman.

remer ,

“on accident“ 🤮

henfredemars ,

Easier is a very relative term. It’ll be really expensive to use a genuine zero-day to do it. Such exploits are few and far between.

dwindling7373 ,

How is it expensive? It is if it eqates to the zero day becoming of public domain, and this is not the case here. They can say they guessed the password while in fact they exploited some unknown vulnerability…

randomaccount43543 ,

Do they say what phone it was?

LodeMike ,

Yeah my guess is some shitty android.

WallEx ,

Oh, a shill in the wild.

LodeMike ,

No, a shitty android (as in one that has a security flaw in it). I use Android lol.

WallEx ,

Yeah, like an old IOS on an old iPhone, that doesn’t get updates anymore?

autotldr Bot ,

This is the best summary I could come up with:


Just two days after the attempted assassination at former President Donald Trump’s rally in Butler, Pennsylvania, the FBI announced it “gained access” to the shooter’s phone.

Cooper Quintin, a security researcher and senior staff technologist with the Electronic Frontier Foundation, said that law enforcement agencies have several tools at their disposal to extract data from phones.

The bureau famously butted heads with Apple in late 2015 after the company refused to help law enforcement get around the encryption on the San Bernardino, California shooter’s iPhone.

Early in the following year, Apple refused a federal court order to help the FBI access the shooter’s phone, which the company said would effectively require it to build a backdoor for the iPhone’s encryption software.

“The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor,” Cook wrote.

Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory, said the Pensacola shooting was one of the last times federal law enforcement agencies loudly denounced encryption.


The original article contains 1,208 words, the summary contains 180 words. Saved 85%. I’m a bot and I’m open source!

0x0 ,

The article does mention Cellebrite.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines