[Noisebridge-discuss] FBI, stumped by pimp's Android pattern lock, serves warrant on Google
superq at gmail.com
Sat Apr 21 10:37:44 PDT 2012
The funny part is, the feds are still not going to get the password to
unlock the device. Have fun with that hashed password. Google's not
stupid enough to store user passwords in plain text.
On Sat, Apr 21, 2012 at 03:58, Nick Shapiro <me at nickshapiro.net> wrote:
> This is an everyday thing.
> When Google receives a legal American warrant (which they do) they follow
> American law and provide the information.
> Including deleted gmail. Google, as required by law, keeps copies of deleted
> gmail for at least 30 days so that it can provide the messages when
> subpoenaed. Which they do.
> On Fri, Apr 20, 2012 at 8:34 PM, Jake <jake at spaz.org> wrote:
>> The FBI, which didn't have the right to search the phone without a
>> warrant, obtained one on February 13, 2012. They took the phone from the
>> parole agent and sent it off to an FBI Regional Computer Forensics Lab in
>> Southern California. There, technicians attempted to gain access to the
>> contents of the memory of the cellular telephone in question, but were
>> unable to do so, said the FBI. They were defeated by, of all things,
>> Android's pattern lock [not always notable for its high security].
>> Technicians apparently mis-entered the pattern enough times to lock the
>> phone, which could only be unlocked using the phone owner's Google account
>> credentials. But Dears wasn't cooperating, and the FBI didn't have his
>> credentials. So it was back to a judge with a new warrant application,
>> filed on March 9, 2012. That application, which was apparently supposed to
>> be sealed, was instead made public and was located today by security
>> researcher Chris Soghoian.
>> Noisebridge-discuss mailing list
>> Noisebridge-discuss at lists.noisebridge.net
> Noisebridge-discuss mailing list
> Noisebridge-discuss at lists.noisebridge.net
More information about the Noisebridge-discuss