View Single Post
Posts: 649 | Thanked: 762 times | Joined on Mar 2012 @ Ohio
#2680
Originally Posted by juiceme View Post
What is there in phones, hmm?
  • PKI keys to everything from jenkins servers to github accounts and between
  • email correspondance, both professional and private
  • sms/mms correspondance, both professional and private
  • contact details for famous and infamous people
  • compromising pictures that could get you blackmailed
  • compromising pictures used for blackmail
  • cryptocurrencies
  • passwords for ebay, paypal, amex, visa, various banks, national lottery, car rental companies, airline accounts, etc...
  • personal documentation, medical information, electronic medicine receipts
  • GPS traces and tracks, coordinates for caches of drugs and precious metals

Getting access to someone's phone is the best way to hack that person, to totally steal identity.
Even if there is no special information in the device itself; just about every online account you have has 2-factor-auth based on your phone number. And the email client in the phone most probably already remembers your mail password... Need I spell it out for you?
Again, I was solely speaking for myself. I have no worries about people getting access to my phone (or accounts connected to my phone).

I now see that you are far more important than I, in which case maybe worrying that someone will take a mold of your finger to access your phone is warranted.

Last edited by imaginaryenemy; 2018-07-16 at 18:09. Reason: Typo
 

The Following 2 Users Say Thank You to imaginaryenemy For This Useful Post: