If you absolutely have to hand over your phone, turn it off completely, like hold the power button and then tap the off icon. That will dump any keys out of RAM, which is why it always requires the full password to unlock when you turn it back on.
Both in terms of how your phone works and the leaks we've seen, the cracking tools the police have are overall significantly less likely to be successful when used on a phone that's been turned off and not unlocked since.
Also, IIRC iphones have a feature where they will dump at least some of the system keys from RAM if you push the lock button five times. I'd still trust fully off more but that's easier to do covertly.
Broadly, because the only way to get it was from other humans. Specifically, because a lot of other humans essentially went out of their way to give it to other people.
They mean the Bluetooth MAC address. It'll capture your phone's and can tell who the manufacturer is but the rest of the address is randomized. That said, lots of watches/earbuds/assorted smart Bluetooth things aren't randomized because manufacturers are lazy.
This seems like an odd move. Let China pay money to use ClosedAI hallucinations instead of using the money to develop their own hallucinations that the US has no insight into.
There's no technology transfer if they just using the hallucination outputs, it's just free money for trash.
Yeah but it really shouldn't be that way. Just add a pin or something, it's way too easy for people to just grab devices or install malware to leak keys. The current standard for security is that everything is encrypted at rest regardless of whole disk encryption.
Signal is still better that most of the stuff out there but it's not above well intentioned criticism
Intrinsically/semantically no but the expectation is that the texts are encrypted at rest and the keys are password and/or tpm+biometric protected. That's just how this works at this point. Also that's the government standard for literally everything from handheld devices to satellites (yes, actually).
At this point one of the most likely threat vectors is someone just taking your shit. Things like border crossings, rubber stamped search warrants, cops raid your house because your roommate pissed them off, protests, needing to go home from work near a protest, on and on.
RF analysis is kinda difficult, you'd need to take the car out into the middle of nowhere and have access to fairly good equipment. A tinySA would maybe work if you're very patient but data transmissions are generally very bursty so it may be difficult to nail down where it's coming from in a sane amount of time.
One option would be to try to figure out if there are any FCC filings for your car. All filings will have pictures of whatever module is being used and what antenna systems it uses which may give you a good idea of where it is and what it looks like. There should be an FCC ID mentioned somewhere at the beginning or end of the cars manual. Googling that should bring up some stuff.
I'm adjacent to the industry. This is dumb but I understand the reasoning. We're getting left behind in the electronics world. Nobody is creating hardware startups because every few months there's a viral blog post with a "hardware is hard" title on HN and none of the VC assholes want to fund anything but web based surveillance capitalism ad tech because it's a surefire way to make money. Even if you do get funded and you're US based you're absolutely doing all your manufacturing in China if you're remotely consumer facing (b2big-b has different rules). That means Chinese companies get all the benefits of all the labor from your highly trained engineers when they get the design files. If you try to build anything at volume in the US you have strikingly few options for boards and parts. Everything is whole number multiples of fucking PCBway and half the time it's lower quality unless you're paying aero-defense prices which is the only business anyone wants.
Literally all of the alternatives are open and much more capable for it. You can go buy a pixhawk and basically any frame and have something much more powerful for much less money, you just have to be willing to bolt two or three parts together.
If you absolutely have to hand over your phone, turn it off completely, like hold the power button and then tap the off icon. That will dump any keys out of RAM, which is why it always requires the full password to unlock when you turn it back on. Both in terms of how your phone works and the leaks we've seen, the cracking tools the police have are overall significantly less likely to be successful when used on a phone that's been turned off and not unlocked since.
Also, IIRC iphones have a feature where they will dump at least some of the system keys from RAM if you push the lock button five times. I'd still trust fully off more but that's easier to do covertly.