

That still won’t keep the phone up to date, as you have to decrypt the device for it to update.


That still won’t keep the phone up to date, as you have to decrypt the device for it to update.


Most (older and lower end) phones don’t do encryption in the first place, so BFU becomes barely better than an unlocked phone.


Assuming you’re on GrapheneOS: https://grapheneos.org/features#auto-reboot
I don’t think most other OEMs have an auto reboot feature


Afaik, it only disables biometrics. BFU means the entire phone (should be) encrypted. You can test this by playing media and then pressing the lockdown button. If the media continues playing, it’s not encrypted.
If you can’t shut your phone down for whatever reason, disabling biometrics would be the second best option (assuming police cannot force you to reveal your password).
I think you need to learn how cookies work. In this case it was probably a tracker appended to the link (the stuff after the question mark). If it was a cookie, they would be able to resubmit by starting a new browsing session.
P.S. why the þ’s? I see you everywhere but keep forgetting to ask.
This kind of mindset is what make the privacy community seem like outcasts. Yes, pedophiles and other criminals would benefit from complete anonymity, but that does not mean we should draw the line at how anonymous someone gets to be because “only pedos operate at that level”.
By hosting it through tor, they’re effectively removing it from the worlds DNS providers, and limiting their users to a minority of advanced users.
Thanks for the reply. While I’m sure that the video feed wasn’t the easiest to access from an outside attackers end, the fact that it was even being sent to the cloud, unencrypted, in the first place is a little more than a “minor” controversy. A company advertising a camera that works local only, and then proceeding to quietly upload everything from the camera to their servers, servers that, mind you, cost money to operate, likely have malicious intent.
While it may have been sensationalized, given this is a privacy comm, it should at least be worth mentioning.
They keep data local by default
https://gizmodo.com/eufy-local-security-camera-cloud-unencrypted-scandal-1850059207
The original security issue was first noticed by security researcher Paul Moore, who noticed Eufy cameras were streaming recorded video to a cloud server on the site’s web portal, even though cloud storage wasn’t enabled. That data sent to the cloud remained unencrypted.
https://www.theverge.com/23573362/anker-eufy-security-camera-answers-encryption
Anker has finally admitted its Eufy security cameras are not natively end-to-end encrypted — they can and did produce unencrypted video streams for Eufy’s web portal.
The article also includes a response from Anker.
No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit.