Re: Private data protection.

2008-06-02 Thread Vinc Duran
This is more what I was thinking. Most folks have a trusted system, some where with remote access. At work, a friends', perhaps someplace akin to google docs. You find a computer and send your phone the wipe code. Or the lock up tight and phone home code, or even the delete the private stuff, act

Re: Private data protection.

2008-06-01 Thread Ilja O.
On Sun, Jun 1, 2008 at 11:55 AM, Esben Stien [EMAIL PROTECTED] wrote: Rahul Joshi [EMAIL PROTECTED] writes: The very first thing a phone thief does is throw away the SIM. That's why, if a presence security code is not typed in every nth hour, the phone starts transmitting secretly its

Re: Private data protection.

2008-06-01 Thread Ilja O.
On Sun, Jun 1, 2008 at 11:55 AM, Esben Stien [EMAIL PROTECTED] wrote: Rahul Joshi [EMAIL PROTECTED] writes: The very first thing a phone thief does is throw away the SIM. That's why, if a presence security code is not typed in every nth hour, the phone starts transmitting secretly its

Re: Private data protection.

2008-06-01 Thread Esben Stien
Rahul Joshi [EMAIL PROTECTED] writes: The very first thing a phone thief does is throw away the SIM. That's why, if a presence security code is not typed in every nth hour, the phone starts transmitting secretly its location over all available networks to your home system;). We need GNU

Re: Private data protection.

2008-06-01 Thread Kim Alvefur
On Sun, 2008-06-01 at 10:55 +0300, Ilja O. wrote: Also portable self-destruction hardware would be nice. echo overload /sys/devices/blaha/battery signature.asc Description: This is a digitally signed message part ___ Openmoko community mailing list

Re: Private data protection.

2008-06-01 Thread Philippe Guillebert
Ilja O. wrote: Who says that this password will be created by human? Program should generate it automatically, shows it to user, user writes (or prints) it and saves in piggy bank hoping he will not need it at all. This function will be used so rare that there is not point in creating

Re: Private data protection.

2008-06-01 Thread Joerg Reisenweber
Am So 1. Juni 2008 schrieb Kim Alvefur: On Sun, 2008-06-01 at 10:55 +0300, Ilja O. wrote: Also portable self-destruction hardware would be nice. echo overload /sys/devices/blaha/battery LOL :-) signature.asc Description: This is a digitally signed message part.

Re: Private data protection.

2008-06-01 Thread Rahul Joshi
Good info there from wiki. So, if someone were THAT (9 days) serious about getting the data, he might as well re-flash the whole phone to avoid any trace-backs, destroy root-kits etc. I know I would do that. Which again brings us back to the same point, as the thread says... of DATA protection and

Re: Private data protection.

2008-06-01 Thread Ilja O.
On Sun, Jun 1, 2008 at 2:34 PM, Philippe Guillebert [EMAIL PROTECTED] wrote: Ilja O. wrote: Who says that this password will be created by human? Program should generate it automatically, shows it to user, user writes (or prints) it and saves in piggy bank hoping he will not need it at all.

Re: Private data protection.

2008-06-01 Thread Esben Stien
Ilja O. [EMAIL PROTECTED] writes: Current phone number would be enough information. SMS to a friend that gives this number to you... It's like being at a party and your lighter is gone. You need a homing device to pin point which pocket it's in;). Maybe another solution here is to have an

Re: Private data protection.

2008-06-01 Thread Ilja O.
On Sun, Jun 1, 2008 at 6:43 PM, Esben Stien [EMAIL PROTECTED] wrote: Ilja O. [EMAIL PROTECTED] writes: Current phone number would be enough information. SMS to a friend that gives this number to you... It's like being at a party and your lighter is gone. You need a homing device to pin

Re: Private data protection.

2008-05-31 Thread Rahul Joshi
The very first thing a phone thief does is throw away the SIM. No SIM, No SMS, No protection.. erm.. destruction :) Rahul J On Fri, May 30, 2008 at 11:57 PM, Ian Darwin [EMAIL PROTECTED] wrote: Vinc Duran wrote: I like the stolen phone sms message. Me too. When can I start erasing the

Re: Private data protection.

2008-05-31 Thread Ilja O.
On Sat, May 31, 2008 at 1:49 PM, Rahul Joshi [EMAIL PROTECTED] wrote: The very first thing a phone thief does is throw away the SIM. No SIM, No SMS, No protection.. erm.. destruction :) When my friends phone got stolen it happened the other way - some people. whose numbers were in his phone

Re: Private data protection.

2008-05-31 Thread Ilja O.
On Sat, May 31, 2008 at 2:04 AM, Vinc Duran [EMAIL PROTECTED] wrote: You could make it longer too. I mean you could require receiving multiple sms's. It could be a very long key. Why bother? Even using only alphanumeric characters (I've counted 62 characters) there are more than 10^216

Re: Private data protection.

2008-05-31 Thread Ilja O.
On Sat, May 31, 2008 at 6:32 PM, Andy Green [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I read an provocative estimate a year or so ago that each extra character of a password adds only on average 1.5 bits of entropy to it. ~ Considering how most passwords are

Re: Private data protection.

2008-05-31 Thread Ian Darwin
Ilja O. wrote: On Fri, May 30, 2008 at 9:27 PM, Ian Darwin [EMAIL PROTECTED] wrote: Vinc Duran wrote: I like the stolen phone sms message. Me too. When can I start erasing the phones of people I don't like? :-) You'll have to try hard to guess 120 random alphanumeric (at least) characters.

Re: Private data protection.

2008-05-31 Thread Rahul Joshi
1. This is exactly why thieves dump the SIM in the first place. To avoid getting SIM tracked, which is the quickest easiest. 2. IMEI tracking is as you said involves paperwork but which makes keeping a stolen phone of no use to anyone. Cops use this (in tandem with carriers) to track offenders if

Re: Private data protection.

2008-05-31 Thread Rahul Joshi
I'm no security expert but I'm pretty sure a lightweight 8 bit salt encryption (security guys?) can give any dektop pc software enough trouble to abort the attempt of trying to read a 256 meg worth of datacard, unless it really belongs to the director operations FBI ;) Rahul J On Fri, May 30,

Re: Private data protection.

2008-05-31 Thread Ilja O.
On Sat, May 31, 2008 at 8:13 PM, Rahul Joshi [EMAIL PROTECTED] wrote: I'm no security expert but I'm pretty sure a lightweight 8 bit salt encryption (security guys?) can give any dektop pc software enough trouble to abort the attempt of trying to read a 256 meg worth of datacard, unless it

Re: Private data protection.

2008-05-31 Thread Ilja O.
Also, processors are cheap these days one guy [1] has build 96-core machine (for unknown price). Sorry. That's 24 cores. He's planning to build 96-core next. ___ Openmoko community mailing list community@lists.openmoko.org

Re: Private data protection.

2008-05-30 Thread Ilja O.
On Fri, May 30, 2008 at 4:17 PM, Christoph Fink [EMAIL PROTECTED] wrote: Ilja O. wrote: 1) Auth using PIN number (this requires encrypted image presence in phone file system by it's boot time end -- not reallyl convenient if SD card is used). IMO encrypting Data with the PIN Number is not

Re: Private data protection.

2008-05-30 Thread Ilja O.
I don't see point in making secure protection from somebody that has stolen phone to obtain your data, since anything that phones' CPU will be able to encrypt/decrypt without draining battery much faster than it should be. ... Can be decrypted using desktop PC (or cluster of them) quite

Re: Private data protection.

2008-05-30 Thread Vinc Duran
I like the stolen phone sms message. On Fri, May 30, 2008 at 3:13 AM, Ilja O. [EMAIL PROTECTED] wrote: On Fri, May 30, 2008 at 4:17 PM, Christoph Fink [EMAIL PROTECTED] wrote: Ilja O. wrote: 1) Auth using PIN number (this requires encrypted image presence in phone file system by it's

Re: Private data protection.

2008-05-30 Thread Ian Darwin
Vinc Duran wrote: I like the stolen phone sms message. Me too. When can I start erasing the phones of people I don't like? :-) ___ Openmoko community mailing list community@lists.openmoko.org http://lists.openmoko.org/mailman/listinfo/community

Re: Private data protection.

2008-05-30 Thread Ilja O.
On Fri, May 30, 2008 at 9:27 PM, Ian Darwin [EMAIL PROTECTED] wrote: Vinc Duran wrote: I like the stolen phone sms message. Me too. When can I start erasing the phones of people I don't like? :-) You'll have to try hard to guess 120 random alphanumeric (at least) characters.

Re: Private data protection.

2008-05-30 Thread Vinc Duran
You could make it longer too. I mean you could require receiving multiple sms's. It could be a very long key. On Fri, May 30, 2008 at 3:27 PM, Ilja O. [EMAIL PROTECTED] wrote: On Fri, May 30, 2008 at 9:27 PM, Ian Darwin [EMAIL PROTECTED] wrote: Vinc Duran wrote: I like the stolen phone

Re: Private data protection.

2008-05-30 Thread Vinc Duran
I have a friend who lost his iPhone and was very upset that ATT couldn't remotely wipe it for him... (Not that they ever said they could). On Fri, May 30, 2008 at 3:27 PM, Ilja O. [EMAIL PROTECTED] wrote: On Fri, May 30, 2008 at 9:27 PM, Ian Darwin [EMAIL PROTECTED] wrote: Vinc Duran wrote:

Re: Private data protection.

2008-05-29 Thread Christoph Fink
Ilja O. wrote: 1) Auth using PIN number (this requires encrypted image presence in phone file system by it's boot time end -- not reallyl convenient if SD card is used). IMO encrypting Data with the PIN Number is not such a good thing, because the possibilities of different keys are

Private data protection.

2008-05-27 Thread Ilja O.
Hello. Recent Lifehacher article [1] rose a privacy-related question in my head -- how to protect user personal data if phone is stolen? First of all - I assume that phone was stolen for it's physical contents (and not to steal your data), so attacker will likely just to turn it on, and won't