• Sumocat@lemmy.world
      link
      fedilink
      English
      arrow-up
      20
      arrow-down
      2
      ·
      23 hours ago

      That article is from six years ago and states Cellebrite can unlock high-end Android phones. Since then, Apple has shipped iOS updates to secure against Cellebrite, while the only similarly secure Android phones are Pixels running GrapheneOS and Samsungs with KNOX, all in a perpetual chase.

      • givesomefucks@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        arrow-down
        4
        ·
        23 hours ago

        So when the US government needed in a trump shooters iPhone…

        They gave it to Israel, and Israel gave it back unlocked…

        What did they do? Guess the pass code?

    • favoredponcho@lemmy.zip
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      6
      ·
      edit-2
      17 hours ago

      Your comments are embarrassing for you.

      Read the actual article:

      The Israeli military has decided to ban Android phones for senior officers, on security grounds.

      So, it is because iPhones are “safer.”

      Also, go get informed on mobile security. Cellebrite is well known for providing governments with tools to hack mobile OSes. Posting an article from 6 years ago shows how ill-informed you are on the topic. At least go find the most up to date information because security vulnerabilities are found and patched constantly. Six year old information is useless. What Cellebrite’s current capabilities are gets leaked periodically. Last I can find for iOS is Cellebrite can’t hack iPhones running the latest OS. It can hack Androids, unless they are using GrapheneOS.

      As someone in tech myself, I’d rather have an iPhone than the average Android phone from a security perspective. If you really care about security and are willing to make some trade offs, use GrapheneOS.

      • Xatolos@reddthat.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        14 hours ago

        Your comment is embarrassing you.

        Read the actual article, not the second hand one linked:

        Military intelligence has also exposed repeated “honeypot” schemes in which operatives posed as women online to lure personnel into installing malware, most notably in Operation HeartBreaker. Analysts noted that such campaigns sought access to contacts, photos, and real-time location data on soldiers’ devices.
        The new step follows earlier efforts to harden mobile use across the force, including training and internal drills designed to raise officers’ awareness of social-engineering tactics. In recent years, the IDF even staged scenarios mimicking Hezbollah-linked “honeypots” to stress-test units’ digital discipline.

        It’s not due to security, it’s due to social engineering. The user will always be the weakest link.

        The real article is linked in this second hand one. https://archive.is/Y7iCJ>>

        • favoredponcho@lemmy.zip
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          2
          ·
          edit-2
          13 hours ago

          I’m not sure what point you’re trying to make. The article you link still shows Israel’s military requiring soldiers to use iPhones and not Android devices for security purposes. Just because a hack is achieved through socially engineered user action doesn’t mean OS security can’t mitigate or aggravate an intrusion. It seems Israel is acknowledging that by setting this new requirement and assessing that iPhones are more resistant to getting malware installed on them by an unsuspecting user.

          • Xatolos@reddthat.com
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            14 hours ago

            Ah yes, the old “reading is hard so I ignore the facts”. A classic.

            Maybe you could ask Apple Intelligence to explain it to you, and what’s the difference between computer security and social engineering.

            • favoredponcho@lemmy.zip
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              13 hours ago

              Here is something for you to read from the article you posted:

              The Israel Defense Forces will tighten rules on mobile devices for senior officers and prohibit Android phones on IDF-issued lines, Army Radio reported on Wednesday.

              Under the expected order, commanders from the rank of lieutenant colonel and above will be permitted to use only Apple iPhones for official communications. The step is aimed at reducing the risk of intrusions on senior officers’ handsets, according to the report

              • Xatolos@reddthat.com
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                1
                ·
                13 hours ago

                Good, good. You’re learning basic reading. Now continue read the rest of it.

                Also, since you have no understanding of cyber security, here is Chatgpt to help explain the difference between it and social engineering. I even got it to explain it to a child’s level so it won’t have any scary big words to frighten you:

                • Cybersecurity is like locking the doors and windows of your house so strangers can’t sneak in and take your toys or mess with your stuff. It uses tools like passwords, codes, and special locks on computers to keep everything safe.

                • Social engineering is when a trickster doesn’t try to break the lock but instead pretends to be your friend or someone you trust, so you open the door for them. For example, they might say, “I’m your teacher, give me your homework password,” even though they’re not really your teacher.

                The difference: Cybersecurity is about building strong locks, while social engineering is about tricking people into opening the door themselves.

                • favoredponcho@lemmy.zip
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  edit-2
                  13 hours ago

                  I have a degree in cybersecurity and my day job is in cybersecurity. You’re not actually making a point that makes any sense to the original argument. Also, you missed the point I made. You also seem to not really be capable of connecting the dots made by the article that you linked. It’s the same point.

                  Here is a question for you: if the issue is members of the IDF are falling for honeypots and social engineering and being tricked into installing malware, why then is the IDF restricting its members to using Apple iPhones?

                  Hint: the answer is in your article.

                  • Xatolos@reddthat.com
                    link
                    fedilink
                    English
                    arrow-up
                    2
                    arrow-down
                    1
                    ·
                    13 hours ago

                    If you’re in cyber security, then I pity your employer. You openly admitted you don’t know the main difference between cyber security and social engineering, this is the very basics of security.

                    Two, you need to learn to read the whole article, again, basics of cyber security. If you can’t read an entire article this basic, then how is anyone supposed to expect you to understand how to read a CVE report?

                    “The new step follows earlier efforts to harden mobile use across the force, including training and internal drills designed to raise officers’ awareness of social-engineering tactics. In recent years, the IDF even staged scenarios mimicking Hezbollah-linked “honeypots” to stress-test units’ digital discipline.”

                    You read the first two paragraphs, which aligned with your confirmation bias, and ignored the further details that explained that it’s due to the push against social engineering, which doesn’t help your confirmation bias.