• General
  • Worried about my seized Pixel 7

grapheneosenjoyer1377 how long do you think it will take for them to have a secure element exploit? I know my data is safe for now but they've been able to exploit pixel 5s and older. wondering how long it will take for them to exploit the pixel 7

I haven’t seen anything about the Titan M1 being penetrated, let alone the M2.

Have I missed something?

    Did you change the default reboot after 18 hours option?

    Did you change the default USB-C behavior to "ON'?

    Is it a serious national security investigation where the results aren't charges but drone strikes and rendition teams?

    If the answer to those is no then you have essentially nothing to worry about and there is basically a zero percent chance they crack your phone via technical means (as opposed to learning your PIN somehow).

    Unless they can unlock your phone within 18 hours it will reboot and be BFU.

    Unless you changed the USB settings then, again it will have to reboot before they can establish a USB connection.

    Unless it is a major NatSec investigation no one is potentially burning theoretical GOS exploits to get into your phone. Or the resources needed to try the more esoteric means of potentially cracking it.

      missing-root
      My mistake. The point remains the same though.

      The M2 has no known exploits and any that might theoretically exist aren't going to be used for anything ending up in a court of law until/unless Cellebrite and the like integrate one.

      Timeline on that is impossible to predict, it could be tomorrow, it could be a hundred years from now.

      When did they seize it how much time has passed ? I know someone who his phone pixel 7a seized in Germany and he got it back after 3 months, they were not able to extract any data from the phone.

      Nuttso

      That was a MATRIX phone. I'm not sure if they were running stock GOS with their app, a GOS fork, or something entirely different.

      They were Pixel devices though, and the Tensor chip would be the same.

      I haven't heard of a criminal investigation/prosecution where a Tensor exploit was used to access the phone, but that doesn't mean there isn't one. I would love to see documentation of one though.

      Court cases are one of the best places to learn about practical phone security.