grapheneosenjoyer1377 how long do you think it will take for them to have a secure element exploit? I know my data is safe for now but they've been able to exploit pixel 5s and older. wondering how long it will take for them to exploit the pixel 7
Worried about my seized Pixel 7
I haven’t seen anything about the Titan M1 being penetrated, let alone the M2.
Have I missed something?
Did you change the default reboot after 18 hours option?
Did you change the default USB-C behavior to "ON'?
Is it a serious national security investigation where the results aren't charges but drone strikes and rendition teams?
If the answer to those is no then you have essentially nothing to worry about and there is basically a zero percent chance they crack your phone via technical means (as opposed to learning your PIN somehow).
Unless they can unlock your phone within 18 hours it will reboot and be BFU.
Unless you changed the USB settings then, again it will have to reboot before they can establish a USB connection.
Unless it is a major NatSec investigation no one is potentially burning theoretical GOS exploits to get into your phone. Or the resources needed to try the more esoteric means of potentially cracking it.
JollyRancher the phone is BFU
missing-root
My mistake. The point remains the same though.
The M2 has no known exploits and any that might theoretically exist aren't going to be used for anything ending up in a court of law until/unless Cellebrite and the like integrate one.
Timeline on that is impossible to predict, it could be tomorrow, it could be a hundred years from now.
When did they seize it how much time has passed ? I know someone who his phone pixel 7a seized in Germany and he got it back after 3 months, they were not able to extract any data from the phone.
- Edited
Blastoidea m1 was succesfully expoited
Nuttso source?
Nuttso Got a citation?
Blastoidea If you mean a source, please refer to my answer to missing-root right above!
fluxcondensator that's one. The NFI has an unknown working exploit
Nuttso Good to know, any docs where this information is extracted from?
fluxcondensator court docs
Nuttso Sorry i meant to say any docs that you could share. My bad.
rabidity Also i wonder did your phone run stock OS or GrapheneOS?
- Edited
Here's a nice long thread with a lot of related info, although it might take some digging to find the exact link of interest:
https://discuss.grapheneos.org/d/7658-potential-appearances-of-grapheneos-in-mobile-forensic-reports
- Edited
fluxcondensator no I can't share these. But it was the murder of Peter de Vries in NL.
That was a MATRIX phone. I'm not sure if they were running stock GOS with their app, a GOS fork, or something entirely different.
They were Pixel devices though, and the Tensor chip would be the same.
I haven't heard of a criminal investigation/prosecution where a Tensor exploit was used to access the phone, but that doesn't mean there isn't one. I would love to see documentation of one though.
Court cases are one of the best places to learn about practical phone security.
JollyRancher Now tell us what made u state it was a matrix phone where did u get the info?