APPLE STORE LOOTERS CAN'T USE STOLEN GADGETS ... Safeguards Already In Place | |
docsquat
User ID: 42274789 United States 06/02/2020 10:23 AM Report Abusive Post Report Copyright Violation | LOL! Have you seen the looters? Their pants are half way to their knees as they are running out of the stores. Doubt most of them can even find the power button. Can we PLEASE stop calling them looters? They are peaceful protesters. They are protesting the murder of an innocent black man. Purity of Essence |
Anonymous Coward User ID: 77933412 United States 06/02/2020 10:23 AM Report Abusive Post Report Copyright Violation | hmmm that's funny because I've done it myself. You probably jailbreaked an older version of Apple product. The new bloatware products are much more secure than we think. jailbreaking the OS isn't the issue. the telecom protocol requires a valid IMEI. there's an blacklist IMEI registry that all the telecom providers reference. . |
Anonymous Coward User ID: 78767406 United States 06/02/2020 10:28 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77225709 United States 06/02/2020 10:29 AM Report Abusive Post Report Copyright Violation | how soon before we hear cries of "racism" against Apple ? though I read that on Apple Music today all subcribers are being forced to listen to black music only maybe that will make up for it ? me, I'd be cancelling that shit today , and letting them know why |
GemKline
User ID: 77942505 United States 06/02/2020 10:30 AM Report Abusive Post Report Copyright Violation | [link to www.tmz.com (secure)] Quoting: Anonymous Coward 77932190 Folks who looted the Apple Store at The Grove are in for a rude awakening ... they won't be able to use or pawn the stolen gadgets, thanks to some tech foresight and amateur thievery. Here's the deal ... while looters probably thought they were getting away with grabbing an expensive toy off the showroom shelves at the Apple Store, they basically ended up with paperweights. Our sources tell us ... the phones and laptops stolen from the Apple Store are demos, and they come equipped with special programs that prevent the products from being reset to factory settings, rendering them almost useless. Same goes for very high end hand bags. They all have individual serial numbers. Good luck trying to sell one. No one ever said criminals were bright. |
Anonymous Coward User ID: 78810913 United States 06/02/2020 10:30 AM Report Abusive Post Report Copyright Violation | [link to www.tmz.com (secure)] Quoting: Anonymous Coward 77932190 Folks who looted the Apple Store at The Grove are in for a rude awakening ... they won't be able to use or pawn the stolen gadgets, thanks to some tech foresight and amateur thievery. Here's the deal ... while looters probably thought they were getting away with grabbing an expensive toy off the showroom shelves at the Apple Store, they basically ended up with paperweights. Our sources tell us ... the phones and laptops stolen from the Apple Store are demos, and they come equipped with special programs that prevent the products from being reset to factory settings, rendering them almost useless. Swap out the drives and flash memory and NVRam then re-programme. |
Anonymous Coward User ID: 78810913 United States 06/02/2020 10:31 AM Report Abusive Post Report Copyright Violation | You probably jailbreaked an older version of Apple product. The new bloatware products are much more secure than we think. jailbreaking the OS isn't the issue. the telecom protocol requires a valid IMEI. there's an blacklist IMEI registry that all the telecom providers reference. . Parts only smashed phone off fleabay. |
Anonymous Coward User ID: 77974815 Canada 06/02/2020 10:33 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 76092888 United States 06/02/2020 10:34 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77974815 Canada 06/02/2020 10:41 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77974815 Canada 06/02/2020 10:41 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77974815 Canada 06/02/2020 10:42 AM Report Abusive Post Report Copyright Violation | |
jiffy76
User ID: 78122900 United States 06/02/2020 10:43 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73963310 United States 06/02/2020 10:51 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 76092888 United States 06/02/2020 10:53 AM Report Abusive Post Report Copyright Violation | You probably jailbreaked an older version of Apple product. The new bloatware products are much more secure than we think. yeah it was a much older version actually I haven't done it in a long time... Make it a fun weekend project! |
Anonymous Coward User ID: 77585423 United States 06/02/2020 10:57 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77024704 United States 06/02/2020 10:58 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77933412 United States 06/02/2020 10:59 AM Report Abusive Post Report Copyright Violation | You probably jailbreaked an older version of Apple product. The new bloatware products are much more secure than we think. jailbreaking the OS isn't the issue. the telecom protocol requires a valid IMEI. there's an blacklist IMEI registry that all the telecom providers reference. . IMEI can easily be spoofed have you done it? it can reprogrammed in firmware but I doubt it can be spoofed. other products I've worked on have a two-key system, you need the original encryption key to generate the 2nd and the client only has a decoder. yeah, it looks like you can do a hardware bypass, so there's the check against the 2nd key always passes. [link to www.firstpost.com (secure)] you'd need some specialized hardware but probably not that expensive. |
Anonymous Coward User ID: 77024704 United States 06/02/2020 11:06 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77024704 United States 06/02/2020 11:07 AM Report Abusive Post Report Copyright Violation | You probably jailbreaked an older version of Apple product. The new bloatware products are much more secure than we think. jailbreaking the OS isn't the issue. the telecom protocol requires a valid IMEI. there's an blacklist IMEI registry that all the telecom providers reference. . IMEI can easily be spoofed When you are hacking people's phones the IMEI is fucking precious ain't it. |
Anonymous Coward User ID: 77933412 United States 06/02/2020 11:11 AM Report Abusive Post Report Copyright Violation | ... Quoting: Anonymous Coward 77932190 You probably jailbreaked an older version of Apple product. The new bloatware products are much more secure than we think. jailbreaking the OS isn't the issue. the telecom protocol requires a valid IMEI. there's an blacklist IMEI registry that all the telecom providers reference. . IMEI can easily be spoofed have you done it? it can reprogrammed in firmware but I doubt it can be spoofed. other products I've worked on have a two-key system, you need the original encryption key to generate the 2nd and the client only has a decoder. yeah, it looks like you can do a hardware bypass, so there's the check against the 2nd key always passes. [link to www.firstpost.com (secure)] you'd need some specialized hardware but probably not that expensive. "The phone would then be connected to a device bought from a local market, which changed its IMEI number electronically." the fact that they're using language like "cracking the IMEI" tells me there's some kind of 2-key system like bitcoin or ethereum. they're probably spoofing with a known IMEI pair from an existing working phone. That will only work for a short time, I think. |
Anonymous Coward User ID: 77206855 United States 06/02/2020 11:11 AM Report Abusive Post Report Copyright Violation | You probably jailbreaked an older version of Apple product. The new bloatware products are much more secure than we think. yeah it was a much older version actually I haven't done it in a long time... Make it a fun weekend project! Dude who ever this is, is a fuckin theif. |
Anonymous Coward User ID: 78014575 United States 06/02/2020 11:13 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77764259 United States 06/02/2020 11:13 AM Report Abusive Post Report Copyright Violation | |
marooned
User ID: 70666044 United States 06/02/2020 11:15 AM Report Abusive Post Report Copyright Violation | [link to www.tmz.com (secure)] Quoting: Anonymous Coward 77932190 Folks who looted the Apple Store at The Grove are in for a rude awakening ... they won't be able to use or pawn the stolen gadgets, thanks to some tech foresight and amateur thievery. Here's the deal ... while looters probably thought they were getting away with grabbing an expensive toy off the showroom shelves at the Apple Store, they basically ended up with paperweights. Our sources tell us ... the phones and laptops stolen from the Apple Store are demos, and they come equipped with special programs that prevent the products from being reset to factory settings, rendering them almost useless. Linux USB .iso has entered the chat |
Anonymous Coward User ID: 78919163 United States 06/02/2020 11:15 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77933412 United States 06/02/2020 11:18 AM Report Abusive Post Report Copyright Violation | ... Quoting: Anonymous Coward 77932190 You probably jailbreaked an older version of Apple product. The new bloatware products are much more secure than we think. jailbreaking the OS isn't the issue. the telecom protocol requires a valid IMEI. there's an blacklist IMEI registry that all the telecom providers reference. . IMEI can easily be spoofed When you are hacking people's phones the IMEI is fucking precious ain't it. I spent a little time on this back when my iphone was stolen. Revisiting it in more detail because I'm bored. [link to security.stackexchange.com (secure)] "The IMEI is not a hash. It is a (usually) unique identifier for mobile devices which are GSM capable. When a phone is placed on the barred list, the carriers all get a copy of this list, and their towers will simply send back a "barred" rejection if a barred IMEI tries to register on the system. The hardware's support for programming the IMEI is variable, though many baseband implementations nowadays have a write lock which can't be undone once set (at least without serious trickery). The usual way in which people get around barred IMEIs is to take a non-barred donor board from another device with severe physical damage (e.g. smashed screen and case) but with an otherwise functioning mainboard" so the IMEI in native state is just a key, but there are vendor-specific schemes which add an encryption scheme. Hackers are using working IMEIs from broken phones, which makes a lot of sense since you probably can't resurrect that number anyway. |
Q33
User ID: 78698051 Canada 06/02/2020 11:19 AM Report Abusive Post Report Copyright Violation | [link to www.tmz.com (secure)] Quoting: Anonymous Coward 77932190 Folks who looted the Apple Store at The Grove are in for a rude awakening ... they won't be able to use or pawn the stolen gadgets, thanks to some tech foresight and amateur thievery. Here's the deal ... while looters probably thought they were getting away with grabbing an expensive toy off the showroom shelves at the Apple Store, they basically ended up with paperweights. Our sources tell us ... the phones and laptops stolen from the Apple Store are demos, and they come equipped with special programs that prevent the products from being reset to factory settings, rendering them almost useless. who would want apple anyway they can keep that broke ass shit fuck china |
Anonymous Coward User ID: 77933412 United States 06/02/2020 11:22 AM Report Abusive Post Report Copyright Violation | ... Quoting: Anonymous Coward 77933412 jailbreaking the OS isn't the issue. the telecom protocol requires a valid IMEI. there's an blacklist IMEI registry that all the telecom providers reference. . IMEI can easily be spoofed When you are hacking people's phones the IMEI is fucking precious ain't it. I spent a little time on this back when my iphone was stolen. Revisiting it in more detail because I'm bored. [link to security.stackexchange.com (secure)] "The IMEI is not a hash. It is a (usually) unique identifier for mobile devices which are GSM capable. When a phone is placed on the barred list, the carriers all get a copy of this list, and their towers will simply send back a "barred" rejection if a barred IMEI tries to register on the system. The hardware's support for programming the IMEI is variable, though many baseband implementations nowadays have a write lock which can't be undone once set (at least without serious trickery). The usual way in which people get around barred IMEIs is to take a non-barred donor board from another device with severe physical damage (e.g. smashed screen and case) but with an otherwise functioning mainboard" so the IMEI in native state is just a key, but there are vendor-specific schemes which add an encryption scheme. Hackers are using working IMEIs from broken phones, which makes a lot of sense since you probably can't resurrect that number anyway. yeah, so I reverse-engineered it pretty close. "From what I've read, modern iOS devices implement NCK using something analogous to public key cryptography, with the carrier unlock data sent via SMS" Basically a 2-key system like bitcoin. Not bad for a genius retard. |
Anonymous Coward User ID: 74107208 United States 06/02/2020 11:24 AM Report Abusive Post Report Copyright Violation | |