[x] Link-bait title
[x] Unsubstantiated fear mongering
[x] Absence of any specific technical details
[x] Secondhand, factually inaccurate reporting
[x] Primary source over 1 year old, and very much out of date
Who actually upvoted this and why?Most phones? Can someone provide examples of phones that offer data connectivity when the phone is powered off?
Re-submitted last week: http://news.ycombinator.com/item?id=4951354
Guess geek.com picked up this re-submission and churned an article out of it?? ;)
Recently this attack was back in the news due to NSA referencing it in a mobile device security paper.
BTW if anyone has questions about it, feel free to ask me. I'm the guy (along with friends) who was building these kiosks and deploying them at "hacker" conferences and then gave a presentation on the matter.
iOS devices have put in a phenomenal effort to secure against these attacks, including requiring encryption keys before allowing unknown computers to access the device or data.