This is the point, we can implant data remotely in devices since years, there are hundreds of different methods to do so, here instead, it's even easier, they could potentially just plant something on their cloud side (iCloud), and if you have sync (if not they have anyway backdoors so...), it could be auto sync'ed / downloaded and hidden in your phone
Then when come, they'll will know exactly on which device and which file they are coming for
There are forensic ways to prove it's not your file and stuffs (CRC/Fingerprint/etc), but that's something geeks or field dedicated lawyers do know, 99% of the population would be literally fucked up without knowing what is happening and why
Yes I am wondering if there is a positive attribution system that can be put on a phone to prove you didn’t put that on your phone when they come to do a frame job
Well there are basic things like the timestamp (but could be manipulated at a file system level if you know how), metadata, signatures (source os / current os), CRC values, fingerprints, and a few more on the digital side, and other stuffs on the logical (RAM / buffers / cells / etc)
An example, normally, first thing that the police does when they size a media, is to connect it tru a write-blocker device, even before imaging/cloning it, reason for is that if you simply plug up a hard drive taken from another system, it will do some stuffs between the BIOS and the OS and write some data (nothing that the user sees, hardware and software level stuffs), and the first thing one could do, would be to have a whole drive CRC match that would dismiss the proof, as the CRC it's a unique hash generated every time something changes (even a bit), so the write-blocker prevents physically any possible write command to the drive, same principle applies for a file
None whatsoever, the phone service company has root over your device, that's how they push OS updates to it. They can send RATs and CP to your phone, forget timestamping the file, they can timestamp the write to the HDD itself.
This is my thoughts on The Vegas shooters brother. Law enforcement found child porn in his computer just days after the shooting and he was immediately taken away.
The vault 7 WikiLeaks prove that CIA has technology where they can leave a trail of metadata that makes it appear that you searched, downloaded, transfered, stored, etc illegal material, this giving law enforcement a case during a forensic audit.
Push Data is already happening all the time with mobile system updates.
Also, plenty of people are required to have some form of push authentication to log into their work site from home, replacing a USB key authentication.
In my case, my phone requires a "push authentication" app in place of a HASP Key/dongle when I work remotely in order to use the licensed software used by our organization.
It's a giant security threat (on a personal level) , and I refused to use it on my personal phone. Wouldn't work remotely until they provided me with a company-paid mobile phone. And even THAT bothers me. I know powering it down DOESN'T actually "turn it off", as pulling the battery alerts the IT guys (but turning the phone off doesn't, wtf?)
Big brother can watch you easily enough. Privacy is near-dead.
I don't have a cell phone and I'm a 28 year old female. It is possible. Yes whenever anyone finds out they think I'm nuts. I wouldn't mind keeping a jitterbug or something in my car for emergencies, I just haven't gotten around to getting one because I detest cell phones so much. It's great when no one can get a hold of you to cover their shift at work and you never have to deal with spam calls. I keep running shoes in the trunk in case my car breaks down.
Well, given the choice of that or never ever being someone of interest to the government, it seems most people are rolling with the latter. Everyone thought the kremlin was a bit mad dropping computers entirely and going to typewriters, doesn't seem so silly now though.
Could work both ways, prosecute their enemies and also protect their cabal pedo buddies by creating doubt on if someone is guilty or innocent of possessing pics. They could say “hey I was hacked on they must be put those on there to frame me.”
And if they can push data into your phone (which they absolutely can) then it becomes real easy for the DS to frame anyone they want.
This is the point, we can implant data remotely in devices since years, there are hundreds of different methods to do so, here instead, it's even easier, they could potentially just plant something on their cloud side (iCloud), and if you have sync (if not they have anyway backdoors so...), it could be auto sync'ed / downloaded and hidden in your phone
Then when come, they'll will know exactly on which device and which file they are coming for
There are forensic ways to prove it's not your file and stuffs (CRC/Fingerprint/etc), but that's something geeks or field dedicated lawyers do know, 99% of the population would be literally fucked up without knowing what is happening and why
Yes I am wondering if there is a positive attribution system that can be put on a phone to prove you didn’t put that on your phone when they come to do a frame job
Well there are basic things like the timestamp (but could be manipulated at a file system level if you know how), metadata, signatures (source os / current os), CRC values, fingerprints, and a few more on the digital side, and other stuffs on the logical (RAM / buffers / cells / etc)
An example, normally, first thing that the police does when they size a media, is to connect it tru a write-blocker device, even before imaging/cloning it, reason for is that if you simply plug up a hard drive taken from another system, it will do some stuffs between the BIOS and the OS and write some data (nothing that the user sees, hardware and software level stuffs), and the first thing one could do, would be to have a whole drive CRC match that would dismiss the proof, as the CRC it's a unique hash generated every time something changes (even a bit), so the write-blocker prevents physically any possible write command to the drive, same principle applies for a file
THIS is what needs to be taught in schools, not sex education.
Interesting, thanks
None whatsoever, the phone service company has root over your device, that's how they push OS updates to it. They can send RATs and CP to your phone, forget timestamping the file, they can timestamp the write to the HDD itself.
This is my thoughts on The Vegas shooters brother. Law enforcement found child porn in his computer just days after the shooting and he was immediately taken away.
The vault 7 WikiLeaks prove that CIA has technology where they can leave a trail of metadata that makes it appear that you searched, downloaded, transfered, stored, etc illegal material, this giving law enforcement a case during a forensic audit.
Apple has already shown they do that, if anyone remembers them forcing music albums into peoples playlists.
I've noticed songs on my android i've never downloaded or listened to as well
https://www.eonline.com/news/1071481/remember-when-apple-forced-a-u2-album-on-us-all
Push Data is already happening all the time with mobile system updates.
Also, plenty of people are required to have some form of push authentication to log into their work site from home, replacing a USB key authentication.
In my case, my phone requires a "push authentication" app in place of a HASP Key/dongle when I work remotely in order to use the licensed software used by our organization.
It's a giant security threat (on a personal level) , and I refused to use it on my personal phone. Wouldn't work remotely until they provided me with a company-paid mobile phone. And even THAT bothers me. I know powering it down DOESN'T actually "turn it off", as pulling the battery alerts the IT guys (but turning the phone off doesn't, wtf?)
Big brother can watch you easily enough. Privacy is near-dead.
Whilst I agree with everything you said too many people forget you can wrap the thing in literal tin foil.
True! Lol
I don't have a cell phone and I'm a 28 year old female. It is possible. Yes whenever anyone finds out they think I'm nuts. I wouldn't mind keeping a jitterbug or something in my car for emergencies, I just haven't gotten around to getting one because I detest cell phones so much. It's great when no one can get a hold of you to cover their shift at work and you never have to deal with spam calls. I keep running shoes in the trunk in case my car breaks down.
Well, given the choice of that or never ever being someone of interest to the government, it seems most people are rolling with the latter. Everyone thought the kremlin was a bit mad dropping computers entirely and going to typewriters, doesn't seem so silly now though.
Hmmm I wonder if this is how they keep all the politicians in line.
Correct. They will be able to watch and frame you as they please.
Could work both ways, prosecute their enemies and also protect their cabal pedo buddies by creating doubt on if someone is guilty or innocent of possessing pics. They could say “hey I was hacked on they must be put those on there to frame me.”