jueves, 15 de marzo de 2012

FBI Can’t Crack Android Pattern-Screen Lock


Pattern-screen locks on Android phones are secure, apparently so much so that they have stumped the Federal Bureau of Investigation.


The bureau claims in federal court documents that forensics experts performed “multiple attempts” to access the contents of a Samsung Exhibit II handset, but failed to unlock the phone.


An Android device requires the handset’s Google e-mail address and its accompanying password to unlock the handset once too many wrong swipes are made. The bureau is seeking that information via a court-approved warrant to Google in order to unlock a suspected San Diego-area prostitution pimp’s mobile phone. (For details on the pimp investigation, check out Ars Technica‘s story on the case.)


Locking down a phone is even more important today than ever because smart phones store so much personal information. What’s more,  many states, including California, grant authorities the right to access a suspect’s mobile phone, without a warrant, upon arrest for any crime.


Forensic experts and companies in the phone-cracking space agreed that the Android passcode locks can defeat unauthorized intrusions.


“It’s not unreasonable they don’t have the capability to bypass that on a live device,” said Dan Rosenberg, a consultant at Boston-based Virtual Security Research.


A San Diego federal judge days ago approved the warrant upon a request by FBI Special Agent Jonathan Cupina. The warrant was disclosed Wednesday by security researcher Christopher Soghoian,


Read more

Enhanced by Zemanta

No hay comentarios:

Publicar un comentario