This is more what I was thinking. Most folks have a trusted system, some
where with remote access. At work, a friends', perhaps someplace akin to
google docs. You find a computer and send your phone the wipe code. Or the
lock up tight and phone home code, or even the delete the private stuff, act
On Sun, Jun 1, 2008 at 11:55 AM, Esben Stien [EMAIL PROTECTED] wrote:
Rahul Joshi [EMAIL PROTECTED] writes:
The very first thing a phone thief does is throw away the SIM.
That's why, if a presence security code is not typed in every nth
hour, the phone starts transmitting secretly its
On Sun, Jun 1, 2008 at 11:55 AM, Esben Stien [EMAIL PROTECTED] wrote:
Rahul Joshi [EMAIL PROTECTED] writes:
The very first thing a phone thief does is throw away the SIM.
That's why, if a presence security code is not typed in every nth
hour, the phone starts transmitting secretly its
Rahul Joshi [EMAIL PROTECTED] writes:
The very first thing a phone thief does is throw away the SIM.
That's why, if a presence security code is not typed in every nth
hour, the phone starts transmitting secretly its location over all
available networks to your home system;).
We need GNU
On Sun, 2008-06-01 at 10:55 +0300, Ilja O. wrote:
Also portable self-destruction hardware would be nice.
echo overload /sys/devices/blaha/battery
signature.asc
Description: This is a digitally signed message part
___
Openmoko community mailing list
Ilja O. wrote:
Who says that this password will be created by human? Program should
generate it automatically, shows it to user, user writes (or prints)
it and saves in piggy bank hoping he will not need it at all.
This function will be used so rare that there is not point in creating
Am So 1. Juni 2008 schrieb Kim Alvefur:
On Sun, 2008-06-01 at 10:55 +0300, Ilja O. wrote:
Also portable self-destruction hardware would be nice.
echo overload /sys/devices/blaha/battery
LOL :-)
signature.asc
Description: This is a digitally signed message part.
Good info there from wiki. So, if someone were THAT (9 days) serious about
getting the data, he might as well re-flash the whole phone to avoid any
trace-backs, destroy root-kits etc. I know I would do that.
Which again brings us back to the same point, as the thread says... of DATA
protection and
On Sun, Jun 1, 2008 at 2:34 PM, Philippe Guillebert
[EMAIL PROTECTED] wrote:
Ilja O. wrote:
Who says that this password will be created by human? Program should
generate it automatically, shows it to user, user writes (or prints)
it and saves in piggy bank hoping he will not need it at all.
Ilja O. [EMAIL PROTECTED] writes:
Current phone number would be enough information. SMS to a friend
that gives this number to you...
It's like being at a party and your lighter is gone. You need a homing
device to pin point which pocket it's in;).
Maybe another solution here is to have an
On Sun, Jun 1, 2008 at 6:43 PM, Esben Stien [EMAIL PROTECTED] wrote:
Ilja O. [EMAIL PROTECTED] writes:
Current phone number would be enough information. SMS to a friend
that gives this number to you...
It's like being at a party and your lighter is gone. You need a homing
device to pin
The very first thing a phone thief does is throw away the SIM. No SIM, No
SMS, No protection.. erm.. destruction :)
Rahul J
On Fri, May 30, 2008 at 11:57 PM, Ian Darwin [EMAIL PROTECTED] wrote:
Vinc Duran wrote:
I like the stolen phone sms message.
Me too. When can I start erasing the
On Sat, May 31, 2008 at 1:49 PM, Rahul Joshi [EMAIL PROTECTED] wrote:
The very first thing a phone thief does is throw away the SIM. No SIM, No
SMS, No protection.. erm.. destruction :)
When my friends phone got stolen it happened the other way - some
people. whose numbers were in his phone
On Sat, May 31, 2008 at 2:04 AM, Vinc Duran [EMAIL PROTECTED] wrote:
You could make it longer too. I mean you could require receiving multiple
sms's. It could be a very long key.
Why bother?
Even using only alphanumeric characters (I've counted 62 characters)
there are more than 10^216
On Sat, May 31, 2008 at 6:32 PM, Andy Green [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I read an provocative estimate a year or so ago that each extra
character of a password adds only on average 1.5 bits of entropy to it.
~ Considering how most passwords are
Ilja O. wrote:
On Fri, May 30, 2008 at 9:27 PM, Ian Darwin [EMAIL PROTECTED] wrote:
Vinc Duran wrote:
I like the stolen phone sms message.
Me too. When can I start erasing the phones of people I don't like? :-)
You'll have to try hard to guess 120 random alphanumeric (at least) characters.
1. This is exactly why thieves dump the SIM in the first place. To avoid
getting SIM tracked, which is the quickest easiest.
2. IMEI tracking is as you said involves paperwork but which makes keeping a
stolen phone of no use to anyone. Cops use this (in tandem with carriers) to
track offenders if
I'm no security expert but I'm pretty sure a lightweight 8 bit salt
encryption (security guys?) can give any dektop pc software enough trouble
to abort the attempt of trying to read a 256 meg worth of datacard, unless
it really belongs to the director operations FBI ;)
Rahul J
On Fri, May 30,
On Sat, May 31, 2008 at 8:13 PM, Rahul Joshi [EMAIL PROTECTED] wrote:
I'm no security expert but I'm pretty sure a lightweight 8 bit salt
encryption (security guys?) can give any dektop pc software enough trouble
to abort the attempt of trying to read a 256 meg worth of datacard, unless
it
Also, processors are cheap these days one guy [1] has build 96-core
machine (for unknown price).
Sorry. That's 24 cores. He's planning to build 96-core next.
___
Openmoko community mailing list
community@lists.openmoko.org
On Fri, May 30, 2008 at 4:17 PM, Christoph Fink
[EMAIL PROTECTED] wrote:
Ilja O. wrote:
1) Auth using PIN number (this requires encrypted image presence in
phone file system by it's boot time end -- not reallyl convenient if
SD card is used).
IMO encrypting Data with the PIN Number is not
I don't see point in making secure protection from somebody that has
stolen phone to obtain your data, since anything that phones' CPU will
be able to encrypt/decrypt without draining battery much faster than
it should be.
... Can be decrypted using desktop PC (or cluster of them) quite
I like the stolen phone sms message.
On Fri, May 30, 2008 at 3:13 AM, Ilja O. [EMAIL PROTECTED] wrote:
On Fri, May 30, 2008 at 4:17 PM, Christoph Fink
[EMAIL PROTECTED] wrote:
Ilja O. wrote:
1) Auth using PIN number (this requires encrypted image presence in
phone file system by it's
Vinc Duran wrote:
I like the stolen phone sms message.
Me too. When can I start erasing the phones of people I don't like? :-)
___
Openmoko community mailing list
community@lists.openmoko.org
http://lists.openmoko.org/mailman/listinfo/community
On Fri, May 30, 2008 at 9:27 PM, Ian Darwin [EMAIL PROTECTED] wrote:
Vinc Duran wrote:
I like the stolen phone sms message.
Me too. When can I start erasing the phones of people I don't like? :-)
You'll have to try hard to guess 120 random alphanumeric (at least) characters.
You could make it longer too. I mean you could require receiving multiple
sms's. It could be a very long key.
On Fri, May 30, 2008 at 3:27 PM, Ilja O. [EMAIL PROTECTED] wrote:
On Fri, May 30, 2008 at 9:27 PM, Ian Darwin [EMAIL PROTECTED] wrote:
Vinc Duran wrote:
I like the stolen phone
I have a friend who lost his iPhone and was very upset that ATT couldn't
remotely wipe it for him... (Not that they ever said they could).
On Fri, May 30, 2008 at 3:27 PM, Ilja O. [EMAIL PROTECTED] wrote:
On Fri, May 30, 2008 at 9:27 PM, Ian Darwin [EMAIL PROTECTED] wrote:
Vinc Duran wrote:
Ilja O. wrote:
1) Auth using PIN number (this requires encrypted image presence in
phone file system by it's boot time end -- not reallyl convenient if
SD card is used).
IMO encrypting Data with the PIN Number is not such a good thing,
because the possibilities of different keys are
Hello.
Recent Lifehacher article [1] rose a privacy-related question in my
head -- how to protect user personal data if phone is stolen?
First of all - I assume that phone was stolen for it's physical
contents (and not to steal your data), so attacker will likely just to
turn it on, and won't
29 matches
Mail list logo