3,789
squad up!
 

More PoPo issues caused by an update...(I'm selling dope, straight off the iPhone)


view the rest of most viewed
 


section   (0 bx goons and 1 bystanders) Share this on Twitter   Share this on Facebook
 

Props Slaps
 5 months ago '17        #1
2326 page views
11 comments


Mr Scaramucci 671 heat pts671
space
avatar space
space
$2,249 | Props total: 33698 33698
More PoPo issues caused by an update...(I'm selling dope, straight off the iPhone)
 

 
iOS 11.4 Disables Lightning Connector After 7 Days, Limiting Law Enforcement Access

The iOS 11.4 update, currently being beta tested, includes a USB Restricted Mode that introduces a week-long expiration date on access to the Lightning port on your iOS devices if your phone hasn't been unlocked, which has implications for law enforcement tools like the GrayKey box.

USB Restricted Mode was outlined this morning by Elcomsoft after testing confirmed that the feature has indeed been enabled. In Elcomsoft's experience, after an iPhone or iPad has been updated to iOS 11.4, if it hasn't been unlocked or connected to a paired computer in the last 7 days using a passcode, the Lightning port is useless for data access and limited to charging.

At this point, it is still unclear whether the USB port is blocked if the device has not been unlocked with a passcode for 7 consecutive days; if the device has not been unlocked at all (password or biometrics); or if the device has not been unlocked or connected to a trusted USB device or computer.

In our test, we were able to confirm the USB lock after the device has been left idle for 7 days. During this period, we have not tried to unlock the device with Touch ID or connect it to a paired USB device. What we do know, however, is that after the 7 days the Lightning port is only good for charging.
With a time limit on the Lightning port, it seems law enforcement officials and bad actors who have physical access to a device will have one week from the time that it was last unlocked to attempt to access it through unlocking tools like the GrayKey, which uses the Lightning port to install software to crack the passcode of an iOS device.

USB Restricted Mode won't prevent tools like the GrayKey box from being used on an iPhone, but it does suggest that the passcode needs to be discovered within a matter of days, severely limiting the amount of time that law enforcement officials have to get into a device.

In developer documentation, Apple says the new mode is meant to bolster security on the iPhone and iPad: "To improve security, for a locked iOS device to communicate with USB accessories you must connect an accessory via Lightning connector to the device while unlocked - or enter your device passcode while connected - at least once a week."

Apple is pairing the new USB Restricted Mode with several other security features that have been introduced through iOS 11 updates. Early iOS 11 updates introduced expiration dates for local backup techniques used to access iOS devices, while iOS 11.3 introduced further limits, cutting down access to just one week.

image

Companies like GrayShift that provide iPhone unlocking tools to law enforcement agencies keep their methods highly secretive to prevent Apple from discovering and patching the exploits being used for access, but USB Restricted Mode and restricted access to local backups introduce clever mitigations that allow Apple to limit these tools even if the specific vulnerabilities haven't yet been addressed.

USB Restricted Mode was actually first introduced in the iOS 11.3 beta, but it didn't make it into the iOS 11.3 release, so its presence in the iOS 11.4 beta does not guarantee that it will be included when iOS 11.4 launches to the public.

image

visit this link https://www.macrumors.com .. stricted-mode/

11 comments for "More PoPo issues caused by an update...(I'm selling dope, straight off the iPhone)"

 5 months ago '15        #2
kingjappyjoe 
space
space
space
$7,868 | Props total: 9357 9357

 5 months ago '09        #3
DEATH 57 heat pts57
space
avatar space
space
$23,425 | Props total: 3611 3611
Guess the police gonna have to do some actyal detective work

 5 months ago '05        #4
Neohuey89 
space
avatar space
space
$2,778 | Props total: 974 974
fu*k what you heard apple blessing all the trap n*ggas

 5 months ago '07        #5
JohnDoe 220 heat pts220
space
avatar space
space
$12,783 | Props total: 7408 7408
 WILLIAM said
Guess the police gonna have to do some actyal detective work
ACTYALLY They're just gonna speed up the process of subpoenaing your phones contents. Besides the off chance someone from a alphabet agency wants to coerce you into something why would you be worried about having your phone info subpoenaed? I feel like only folks flipping dope, terrorists and weirdos with kiddie pr0n or upskirt videos are worried about this.....I get it everyone hates the courts and the law but what am I missing?

 5 months ago '07        #6
JohnDoe 220 heat pts220
space
avatar space
space
$12,783 | Props total: 7408 7408
 JohnDoe said
ACTYALLY They're just gonna speed up the process of subpoenaing your phones contents. Besides the off chance someone from a alphabet agency wants to coerce you into something why would you be worried about having your phone info subpoenaed? I feel like only folks flipping dope, terrorists and weirdos with kiddie pr0n or upskirt videos are worried about this.....I get it everyone hates the courts and the law but what am I missing?
Im ACTUALLY more worried about this kind of sh*t from the Feds City/State Police



How “cell tower dumps” caught the High Country Bandits—and why it matters
Fishing expeditions can pay dividends—but do they need a warrant?
On February 18, 2010, the FBI field office in Denver issued a "wanted" notice for two men known as "the High Country Bandits"—a rather grandiose name for a pair of middle-aged white men who had been knocking down rural banks in northern Arizona and Colorado, grabbing a few thousand dollars from a teller's cash drawer and sometimes escaping on a stolen all-terrain vehicle (ATV).

In each of their 16 robberies, the bandits had a method: "The unknown male identified as suspect number one often enters the banks in rural locations near closing time and brandishes a black semi-automatic handgun. Suspect number one then demands all the money from the teller drawers. He obtains an undisclosed amount of money, puts it in a bag, orders everyone on the ground, then exits the banks with a second suspect. They have been seen leaving the banks on a green or maroon four-wheel ATV with suspect number two driving."

Investigators had bank surveillance footage of the robberies, but the bandits wore jackets, ski masks, and gloves and proved hard to track down. It wasn't for a lack of witnesses or police effort, either. At one 2009 robbery in Pinetop, Arizona, for instance, the bandits got away with $3,827. Witnesses saw a man run from the bank and into a residential area, "looking around as if he were lost." Witnesses later saw the man tear out of the area on an ATV driven by another man. Police followed their escape route and found the spot where the ATV left the road through a freshly-cut barbed wire fence. The cops followed the tracks 17 miles northwest of town before losing the trail completely.

As the regional robberies continued, the FBI was brought into the case. They found a witness to one of the robberies who had seen a suspicious man hanging out by the bank a couple of hours before the robbery, talking on a cell phone. But how does one find a single cell phone user without knowing the cell phone number or the subscriber's name? Indeed, without knowing anything but the time and location?

If you're the FBI, you ask a judge to approve a full "cell tower dump," in which wireless operators will turn over the records of every cell phone that registered with a particular tower at a particular time. (Phones "register" with the nearest cell towers so that the network knows how to route calls.) And then you look for any numbers that stand out.

Fishing for phone numbers
To find the High Country Bandits, the FBI asked a federal magistrate judge to approve four of these cell tower dumps. Investigators picked the "four most rural [robbery] locations in order to minimize the amount of extraneous telephone data that would likely be obtained through such a court order," including the bank in Pinetop, said the FBI. The judge approved the request.

Tower dumps aren't like going after targeted cell phone data on a known suspect; they are more like casting a limited dragnet, pulling in the phone numbers and (rough) location of everyone in the vicinity of the event. And tower dumps are usually obtained without a warrant, instead utilizing a "court order" with judicial oversight but a lower burden than "probable cause." This could potentially mean the government getting warrantless location information for hundreds of people who are not being investigated for any crime.

Did I say "hundreds" of people? The FBI actually received more than 150,000 registered cell phone numbers from this particular set of tower dumps, despite picking the most rural locations possible. What the case agents wanted to do was scan the logs from all four sites on the belief that no single person was likely to be at all four banks during the robbery—except for the robber.

So the FBI dumped all the numbers into a Microsoft Access database and ran a query. As expected, only a single number came back: Verizon Wireless phone number 928-205-xxxx had registered with the tower closest to three of the banks on the day of each robbery. (Verizon didn't have a cell tower covering the fourth bank.) Further analysis found a second number, 928-358-xxxx, that had been in contact with 928-205-xxx and that had registered with two of the towers in question.

The FBI then went back to the judge and obtained more particular court orders covering these specific phone numbers. The phone numbers came back with subscriber names attached: Joel Glore and Ronald Capito. And the location data returned showed that these two phones had been present at most of the 16 bank robberies under investigation. Further, the data showed that both phones tended to travel from Show Low, Arizona, to the location of each bank just before each robbery.

If you're one of those people who still doesn't understand just how much a cell phone reveals about your movements, consider this FBI reconstruction of a single day:

On 11/25/2009, both CAPITO's and GLORE's mobile telephones begin the day at 6:31AM on the same cell tower in Show Low, Arizona, when CAPITO calls GLORE's mobile telephone. Both mobile telephones remain in Show Low until CAPITO's telephone uses a cell tower near Punkin Center, approximately 30 miles south of Payson, Arizona. By approximately 11:00AM, both CAPITO's and GLORE's phones are using the same cell tower in Star Valley, Arizona, approximately 5 miles east of Payson, Arizona, and likely covering areas of Payson, Arizona. By 11:50AM, both CAPITO's and GLORE's mobile telephones are using towers in Payson, Arizona, that are almost certainly within the coverage area of the Compass Bank located at 613 S. Beeline Highway, Payson, Arizona. GLORE's telephone remains on these Payson cell towers and last uses a Payson cell tower located only 1 mile from the Compass Bank at 3:27PM when he receives a call from CAPITO's cell telephone.

CAPITO's telephone continues to use the Star Valley and Payson towers through the 3:27PM call, when CAPITO's telephone is using a cell tower located only 1.7 miles from the Compass Bank. At approximately 3:29PM, the High Country Bandits rob the Compass Bank, 613 S. Beeline Highway, Payson, Arizona. The next call on either GLORE or CAPITO's mobile telephones is at approximately 4:40PM when they are contacting each other and both are using the cell tower near Punkin Center, approximately 30 miles south of Payson, Arizona. Both mobile telephones remain using that cell tower throughout the night and return to Show Low, Arizona by 11:00AM the next day.

The FBI now had a pair of suspects, and they weren't exactly crown princes of crime. For one thing, they used real names when registering their cell phones, and they took their phones with them on the robberies. For another, they kept getting involved with police over issues like dog bites, dramatically raising the odds that they would come under some kind of suspicion. Indeed, on one dramatic occasion, Capito actually called the cops himself.

Glore and Capito, both in their early 50s, had a fractious relationship. In February 2010, three days after they had robbed a bank in Park City, Utah, police received a 911 call from Capito. He was in the mountains outside of Telluride, Colorado, and when the cops arrived they found him carrying a Glock handgun and standing next to a silver Toyota Avalon with blood in the front seat and signs of struggle in the snow.

Capito told them that he and Glore had argued and that he had punched Glore in the nose, after which Glore ran off into the woods. After several hours, Glore had not returned and Capito was worried. The police eventually found Glore "hypothermic and bloody," and they charged Capito with carrying a concealed weapon and with disorderly conduct. But they gave Capito's $4,029 wad of cash to Glore, who promptly used it to bail Capito out of jail. (The Glock had likely just been used in the robbery and the money had probably come from the Park City heist.)

The cops in Telluride had no information to link the two men to bank robberies, but a few weeks later the FBI did, and it put them under surveillance in Show Low, Arizona, where both men lived in the same neighborhood. Agents moved in on March 11. Glore had been having a tough month; agents found him in a hospital, receiving treatment for a ruptured appendix. He admitted everything, saying that he and Capito had been "desperate for money" and that he had served only as the getaway driver.

Capito, too, was picked up but demanded a lawyer. A search of Capito's property turned up all kinds of incriminating evidence, including a log book and the stolen ATV. Capito's wife told investigators that she thought the money he brought home was from casino winnings, and she said that her husband—a former girls' basketball coach—had been out of work for over a year.

On May 15, 2012, Capito was sentenced to 18 years in prison and ordered to pay back his half of the $150,000 he had stolen. Glore's sentencing is, apparently, still pending.


About those 149,998 other numbers...
Bandits? Caught. Justice? Done. But let's step back from the final result for a moment and ponder the technique that provided the big lead—the cell tower dumps. Should we have any concerns with the government getting that sort of mass tracking information on so many Americans without a warrant?

Some judges say yes. Former Magistrate Judge Brian Owsley dealt routinely with warrant requests and court orders until becoming a law school professor earlier this year; he has just written an intriguing paper about the issues surrounding cell tower dumps. In his view, these are clearly "searches" under the Fourth Amendment, and they require a full warrant backed by evidence of "probable cause."

That's because the Supreme Court jurisprudence on surveillance has relied for decades in part on the idea of someone's "reasonable expectation of privacy"—and people certainly expect that their location won't be easily and routinely accessible to law enforcement without a warrant, regardless of whether cell phone technology tracks them or not.

In addition, in its well-known Jones decision of 2012, the Supreme Court ruled that warrantless GPS tracking of a suspect was not allowed, and in response the FBI switched off 3,000 tracking devices. Cell tower dumps might well qualify as warrantless "tracking" under this standard, so Owsley argues that it is in the best interests of both society and investigators to get a warrant first:

In discussing requests for court orders, warrants, and subpoenas with various case agents, I always stressed that denying orders that fail to satisfy the standard is not just doing right by the Constitution and the applicable statutes, but also benefits society as well. These agents do not want to have a conviction hinge on and potentially be overturned because of an order or warrant that does not satisfy the standard. This argument has been made easier by the Supreme Court's decision in Jones, because some agents are now furiously working to determine what, if anything, they need to do to salvage cases involving a Jones-like search. Moreover, Jones has demonstrated that the courts are willing to act as a check on government investigations regarding electronic surveillance. That is particularly true because Jones was a unanimous judgment from a Court that routinely issues decisions split along ideological lines.

In some ways, the issue with tower dumps is more pressing than in Jones because it involves so many people, not just one. As Judge Nicholas Garaufis put it in an opinion:

The cell-site-location records at issue here currently enable the tracking of the vast majority of Americans. Thus, the collection of cell-site-location records effectively enables "mass" or "wholesale" electronic surveillance and raises greater Fourth Amendment concerns than a single electronically surveilled car trip. This further supports the court's conclusion that cell-phone users maintain a reasonable expectation of privacy in long-term cell-site-location records and that the Government's obtaining these records constitutes a Fourth Amendment search.

Cell tower dumps don't provide the precision of GPS tracking, of course, but they can in some cases provide directional and range information from a specific tower at a specific time—close enough to pin people within a few hundred yards. Because warrant applications often remain sealed, however, even judges rarely know how other judges have ruled on them; Owsley was reduced to asking judges he met at conferences whether they had encountered the issue, which is becoming increasingly common.

In the end, Owsley supports the use of tower dumps, so long as agents seek a warrant first and so long as they explain their plan to purge all numbers not germane to the current case. In addition, he argues that those whose records are swept up should be notified after the fact—especially because the records have a bad habit of ending up as evidence in court cases.

 5 months ago '09        #7
DEATH 57 heat pts57
space
avatar space
space
$23,425 | Props total: 3611 3611
 JohnDoe said
ACTYALLY They're just gonna speed up the process of subpoenaing your phones contents. Besides the off chance someone from a alphabet agency wants to coerce you into something why would you be worried about having your phone info subpoenaed? I feel like only folks flipping dope, terrorists and weirdos with kiddie pr0n or upskirt videos are worried about this.....I get it everyone hates the courts and the law but what am I missing?
I got nothing to hide lol

Just commenting on sh*t

 5 months ago '17        #8
Mr Scaramucci 671 heat pts671 OP
space
avatar space
space
$2,249 | Props total: 33698 33698
Android users love cops and big government

 5 months ago '16        #9
Homer Pimpson 
space
avatar space
space
$3,434 | Props total: 7193 7193
another win for the best phone on the market


 5 months ago '18        #10
500nd59 
space
space
space
$276 | Props total: 1145 1145
Damn I been thinking of switching over to iPhone from my s8 ... This is a good look... I'm prolly gone use the iPhone for personal use and cop the note 9 for my business related things

 5 months ago '17        #11
Lazy 2 heat pts
space
space
space
$1,613 | Props total: 5075 5075
 JohnDoe said
ACTYALLY They're just gonna speed up the process of subpoenaing your phones contents. Besides the off chance someone from a alphabet agency wants to coerce you into something why would you be worried about having your phone info subpoenaed? I feel like only folks flipping dope, terrorists and weirdos with kiddie pr0n or upskirt videos are worried about this.....I get it everyone hates the courts and the law but what am I missing?
Do you use curtains or blinds on your windows?

 5 months ago '18        #12
antisocial100 1 heat pts
space
avatar space
space
$988 | Props total: 2751 2751
Big homie Tim Cook doin Gods work on Piru....first with the suwoo red iphone 8 now with this...bless his soul

Home      
  
 


most viewed right now
 164
NFL Colin HoH Kaep with another W: Brittany Renner had to fund all her visits ..
50 comments
2 hours ago
@sports
most viewed right now
 115
Lupe Fiasco Builds On The Democratic Party "I don’t care about what Kanye ass ..
27 comments
1 hour ago
@hiphop
most viewed right now
 110
Image(s) inside Drake plotting on 03 Greedo’s daughter?
57 comments
2 hours ago
@hiphop
most viewed right now
 107
NBA 76ers @ Celtics NBA Season Opener Discussion Thread
358 comments
2 hours ago
@sports
most viewed right now
 94
Image(s) inside Asap Rocky on $100k bed and orgies
39 comments
6 hours ago
@misc
most viewed right now
 63
 Image(s) inside Official 2018 Bet Hip Hop Awards [Discussion Thread]
33 comments
25 minutes ago
@hiphop
most viewed right now
 60
Image(s) inside Sean just went super sayajin 3
17 comments
2 hours ago
@gear
most viewed right now
 46
NBA Kyrie arrives to work with bald eagle feather in his hair
78 comments
3 hours ago
@sports
most viewed right now
 44
Video inside Netflix dropped one of the scariest series of all time
42 comments
7 hours ago
@movies
most viewed right now
 39
NFL Chucky fires back at Rashaan Melvin
26 comments
2 hours ago
@sports
most viewed right now
 35
 NBA The “Order” is going after Zion
4 comments
51 minutes ago
@sports
most viewed right now
 34
 Image(s) inside No Limit 98’
6 comments
24 minutes ago
@hiphop
most viewed right now
 31
Video inside Be honest, do you want the top?
36 comments
7 hours ago
@thotsdimesetc
most viewed right now
 27
Image(s) inside Girl so gorgeous you wouldn’t even feel bad to simp.
37 comments
7 hours ago
@thotsdimesetc
most viewed right now
 26
Image(s) inside Cute busty #29
8 comments
3 hours ago
@thotsdimesetc
most viewed right now
 25
Video inside Men father your sons
54 comments
5 hours ago
@hiphop
most viewed right now
 24
Image(s) inside Oct 16 - ugly creature fu-ked her teen student in classroom during pep..
21 comments
5 hours ago
@news
most viewed right now
 23
Image(s) inside How can they show this on NBC/Network TV with kids watching?
12 comments
1 hour ago
@wild'ish
most viewed right now
 21
Video inside Oct 16 - Girl watches BF get "r@ped" at a haunted house
45 comments
7 hours ago
@news
most viewed right now
 21
Do you think drake brave enough to throw a sub at styles
44 comments
4 hours ago
@hiphop
Top 10 most propped recently
Last few hours...
CJ
20
Dmv1989
14
Lonny Breaux
14
TriniSoldier
13
ReggieA
12
Reflexx
12
Mumbletaker
11
BlackDynamite
11
tdub-zr0
10
squirtofkahlua
10
Top 10 most slapped recently
BlackDynamite
14
WhyEsElvrSurfer
6
COLIN COWHERD
5
Imissmalcolmx17
3
chef12
3
Mutant Boy
3
NinetyThree94
3
DrizzyStan06
3
TaxStoneCooked
3
strungout
2
 
 





most viewed right now
online now  32
Image(s) inside Rumor!!!! Avengers:Annihilation trailer description!!!
53 comments
1 day ago
@movies
most viewed right now
online now  27
Dutch Watt Girl Impressed By Dutch Watt Girls Butt
71 comments
1 day ago
@thotsdimesetc
most viewed right now
online now  23
Image(s) inside More Cushion For The Pushin...
68 comments
1 day ago
@thotsdimesetc
most viewed right now
online now  18
Image(s) inside Them thangs sitting HEAVY!
40 comments
21 hours ago
@thotsdimesetc
most viewed right now
online now  17
Image(s) inside Brazilian Puerto Rican Hybrid. I Almost Nutted Twice Making This Thread
93 comments
1 day ago
@thotsdimesetc
most viewed right now
online now  16
Video inside This New TV Show Is The SH*T
43 comments
2 days ago
@wild'ish
most viewed right now
online now  10
Drake " I made a vest out of you" (Shots at Kanye)
127 comments
22 hours ago
@hiphop
most viewed right now
online now  9
Image(s) inside Lowered my Model 3
28 comments
1 day ago
@rides
back to top
register contact Follow BX @ Twitter Follow BX @ Facebook search BX privacy