SINGAPORE EXPATS FORUM
Singapore Expat Forum and Message Board for Expats in Singapore & Expatriates Relocating to Singapore
Discuss about computers & Internet. Including mobile phones, home appliances & other gadgets. Read about Windows security risks or virus updates.
- Posts: 8333
- Joined: Tue, 01 Sep 2009
- Location: Sister Margaret’s School for Wayward Children
rajagainstthemachine wrote:nakatago wrote:rajagainstthemachine wrote:zzm9980 & X9200
I'm open to buying used memory cards from you guys how many naked photos will I find?
You do NOT WANT to see those.
hey want a used camcorder dude?
@x9200 *steps away from the keyboard slowly*
It's alright; I'll just have a data wiping utility have a pass at it several times.
x9200 wrote:zzm9980 wrote:x9200 wrote:zzm9980 wrote:x9200 wrote:If one is paranoid:
-even zeroing doesn't help
-urandom may, if done few times.
On a practical note: nobody will give a damn sh*t about your private data. You are not the most wanted celebrity. Also if one wants to hack it, (s)he will find a way regardless your efforts. Stay below the radar and manage your date accordingly.
This is one of the stupidest things I've ever seen you type (and you're generally quite intelligent). No one gives a shit? Maybe the *user* gives a shit. Passwords? Financial data? Nude photos (from the article)? Just personal expectation of privacy?
It's not really stupid, just pragmatic:
1) for majority of the users nobody would care to look for such data (leftovers) unless they are still available at the application level. Good that the study showed a potential problem (more real right now as it was advertised) but in reality it was/is extremely unlikely that the next owner was going to make any attempts to recover anything. I bet it is more likely by an order of magnitude that the said devices were lost or stolen with all the data presents in their original condition.
Once a cheap/easy tool is available (There are already a pair of tools I know of, and have for a while) to do this, lots of people will be doing this to old devices. Mobile phone vendors need to consider this.
Lots? They will be buying 2nd hand camera phones from ebay and such to check if there are some naked photos inside? C'mon.2) no one with a tidbit of common sense store this sort of data in such devices. I think you as a security specialist are more then aware that practically always it is possible to restore the data, factory reset or not. It is just the matter what means are employed. If you chose to store your naked photos on such device you always take a risk. Always.
Also, if you have a PC with sensitive data and you encounter a disc failure with no access to the disc within the warranty period what should you do?
Yes, true, but who, an average who, cares to recover such data? You sold your phone, somebody bought it and then, this somebody had to: a) know he could do it; b) make some effort to do this. A 1/10k chance?
Again, why do you think somebody would make an effort (personal, finantial) to buy a phone from an anonymous person hoping to take over her or his e-mail passwords? Just realize what efford this would require, assuming the intentions are criminal.3) Yes, encryption helps but if someone really wants I bet the key can be also recovered, or not? The only true* protection would be to have the key on a separate piece of hardware and have a new one issued with the change of the owner with the old one being physically destroyed.
*true as of the computing power available to check all the possible keys.
Every iPhone since iPhone4 has had dedicated crypto storage specifically for this purpose. It's easy for Apple since they own the hardware and software stack. Other phone makers should do the same. It's harder for them.
But this is a built in storage and can not be replaced/destroyed by the end user. Or is this some sort of storage that once wiped out is not possible to recover data at all? Somehow I doubt that in this world of permanent invigilation a company would sell a product where the data can not be recovered.
I hate when people reply in line in color, since it's obnoxious to try and address the individual points.
I don't agree with your points, and you don't agree with mine. You don't seem to value personal privacy as much as I do. I don't think we'll convince each otherwise so I'll just give up.
For the crypto chip, your doubts are unfounded as you're wrong. Feel free to read about it: http://infocenter.arm.com/help/topic/co ... epaper.pdf
zzm9980 wrote: I don't agree with your points, and you don't agree with mine. You don't seem to value personal privacy as much as I do. I don't think we'll convince each otherwise so I'll just give up.
You are generally quite intelligent person so I am a bit surprised you miss this simple point that this is not about the privacy but risk assessment and pragmatism. All the sudden you miss the whole forest for the trees.
- the lynx
- Posts: 5252
- Joined: Thu, 09 Dec 2010
- Location: Location: Location: Location: Location: Location: Location: Location: Location: Location: Location:
- Similar Topics
- Last post
Users browsing this forum: No registered users and 2 guests