[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Crypto mechanics in ios8 and android L
- To: grarpamp <[email protected]>
- Subject: Crypto mechanics in ios8 and android L
- From: [email protected] ([email protected])
- Date: Tue, 14 Oct 2014 19:22:46 -0400
- Cc: [email protected]
- In-reply-to: <CAD2Ti2_V1cPeSmZs8a=8akb0D+aNqMzHf4byE3vwAtSmDuV1WA@mail.gmail.com>
- References: <CAD2Ti2_V1cPeSmZs8a=8akb0D+aNqMzHf4byE3vwAtSmDuV1WA@mail.gmail.com>
How would tethering a tablet or laptop to a smartphone be more private
than directly using the smartphone?
Do tablets have a secret baseband?
How to drive a phone's sms over it's usb port?
On 10/10/2014 11:56 pm, grarpamp wrote:
> http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html
> http://nelenkov.blogspot.com/2014/10/revisiting-android-disk-encryption.html
>
> That's the frontdoor. Baseband's still present and wide open. Thus
> consider a non-cell device (a pad/laptop) tethered to cell hotspot
> or another phone to provide mobile wifi voice/data (IP) to the device.
>
> Is connecting to a cell hotspot or another phone to use the native
> cell voice/data (cell) of the cell network even possible?
>
> ie: You can drive a phone's sms over it's usb port. But that's just
> sms, not cell voice or cell IP.