Ask Slashdot: How Can I Prepare For the Theft of My Android Phone? 374
New submitter Adam Jorgensen writes "Last week my 4-week old Moto G phone was stolen while getting onto the train at Salt River in Cape Town, South Africa. That in itself is no big deal. Cellphone theft is a huge problem here in South Africa and I've had at least two previous cellphones stolen. The big deal this time, for me at least, was that this was the first time I've lost an Android phone to theft. When I actually sat down and thought about it, losing a fully configured Android phone is actually a big deal as it provides ready access to all kinds of accounts, including ones Google account. This could potentially allow the thief to engage in all kinds of malicious behavior, some of which could have major implications beyond the scope of the theft.
Luckily for me it seems that the thief did the usual thing: Dumped the SIM card, wiped the phone, and switched it off. It's probably had its IMEI changed by now and been sold on to some oblivious punter, possibly some oblivious punter in another country. Still, the potential for serious issue is making me have second thoughts about replacing the phone with anything capable of doing much more than calling. My question is this: Are there any serious solutions out there for Android that secure against theft?"
Luckily for me it seems that the thief did the usual thing: Dumped the SIM card, wiped the phone, and switched it off. It's probably had its IMEI changed by now and been sold on to some oblivious punter, possibly some oblivious punter in another country. Still, the potential for serious issue is making me have second thoughts about replacing the phone with anything capable of doing much more than calling. My question is this: Are there any serious solutions out there for Android that secure against theft?"
He continues:
By serious I mean solutions that go beyond the laughably easy to defeat 'Find My Phone' and 'Remote Wipe' options provided at present. Presently I'm thinking along the lines of:
- Full encryption of phone contents
- Some kind of 'Travel Safe' mode that would lock the phone down and trigger a full wipe of not unlocked correctly (Including wiping the phone on next boot if not unlocked before being switched off/running out of battery).
So, any ideas?"
Seriously? (Score:5, Informative)
Encrypt the phone, and set a numeric PIN of 6 or more.
Done and done.
Re:Seriously? (Score:5, Funny)
Re:Seriously? (Score:5, Funny)
Re:Seriously? (Score:4, Insightful)
It isn't so much society in general, but the black community itself that seems to have a problem with what it takes to get out of the vicious cycle of poverty and crime.
I've known blacks, even back when I was growing up, that during HS were working hard to get an education, taking part in scholastic function, like president of student council, etc. They were often shunned or ridiculed by their peers for "acting white". I was shocked to hear this.
I think that is a large part of what the problem is. The culture, at least of the lower end of the class system, of blacks don't promote things like getting an education and working hard to be successful in today's society as something to strive for. However, thug life, gangsta rap type trappings, and professional athletes are the main heroes that are held up as something to emulate.
I think this is part of the problem, and it is not something that you can legislate away.
This general type of attitude is something that can ONLY be fixed from the inside of the community itself, and so far, this isn't being pushed. And sadly, you often see folks that DO escape from this cycle of poverty into successful jobs and neighborhoods, they also shun the lower end and often understandably so, as that they don't want their kids around that culture.
Re:Seriously? (Score:5, Informative)
Followup, in case you dont know how to do that:
http://www.howtogeek.com/14195... [howtogeek.com]
Its been available for quite some time IIRC.
Re: (Score:2)
Re: (Score:2)
None of the things will protect against theft.
The thief will still pick your pocket. When they get back to their evil lair, they will find it is password protected. If they try to break the protection (which is easy with the right tools) they will find it is encrypted. Then they will trash the device or perhaps attempt to sell it. For you it doesn't matter, your device is still stolen and must be replaced.
There are tons of tools out there to make backups so restoration is easy on a new device. But your de
Re:Seriously? (Score:5, Insightful)
None of the things will protect against theft.
The thief will still pick your pocket. When they get back to their evil lair, they will find it is password protected. If they try to break the protection (which is easy with the right tools) they will find it is encrypted. Then they will trash the device or perhaps attempt to sell it. For you it doesn't matter, your device is still stolen and must be replaced.
There are tons of tools out there to make backups so restoration is easy on a new device. But your device is still stolen and must be replaced.
Encryption has jack shit to do with recovering the hardware.
Your data and personal information contained on the phone can be proven far more valuable and far more difficult to recover from if leaked.
Neither of these facts belie your ignorance here. Use your damn head. Encryption helps mitigate a rather specific problem with phone theft.
Re:Seriously? (Score:5, Funny)
None of the things will protect against theft.
No. The only way I know to do that is what I do: forget it at home every day.
Re: (Score:3)
Exactly, if the phones encrypted they're going to have to wipe it to use it. Ok, yea, if the NSA gets the phone, I'm sure they could guess the password eventually, but I doubt you're a political dissident or whatever. You could also get one of many programs that let you remotely control or locate your phone. Yes, if they turn it off you're not going to find it but at least you have a decent chance. The number of criminals that are smart enough to plan for such things are few and far between.
Re: (Score:3)
Well...
Re: (Score:2)
Re: (Score:3)
Political dissidents are actually legal in South Africa, as long as they are peaceful (though many aren't). We are certainly not a functioning democracy, but this is one of the more progressive African Countries. We even have multiple political parties, and the giant struggle party that tends to rule African countries is losing some support.
Back on topic, I quite like Samsmung's feature that lets me remote track and remote wipe the phone. I heard something about google or others providing such a service. Mi
Re:Seriously? (Score:5, Informative)
Re: (Score:2, Insightful)
It is scary how much important private stuff we keep on these portable smartphones, tablets, etc these days, and how screwed we could be if that falls into the wrong hands.
Maybe you shouldn't be putting your important private stuff on your phone?
Re: (Score:2)
Encrypt the phone, and set a numeric PIN of 6 or more.
Done and done.
Funny you suggest that, but as a trial a few years back on my android smart phone I did just what you suggested. I was easily able to bypass it by going into the developer menu and turning it off after doing a factory reset.
Re: (Score:3)
If you've done a factory reset, then the phone owner doesn't need to worry about their data anymore...
Re:Seriously? (Score:5, Informative)
Here is what I do to secure my Android device:
1: Unlock the bootloader, flash a CM or custom ROM that doesn't sport crapware.
2: Encrypt the device with a screen locker PIN 4+ digits. I personally use six for this, just for ease of typing.
3: Use "su -c vdc cryptfs changepw foobar" to change the passphrase. This separates the passphrase Android asks for at boot versus the screen unlocker PIN. Of course, if you change the screen password, the cryptfs password will change, so you will need to use root and change it again, or use an app for this.
The advantage of this method is that the boot password can be very secure, while the password to get past the screen locker can be easy to type in.
4: Relock the bootloader. This forces someone to have to erase the data partition if they want to reflash.
5: Install a third party security app like Cerberus or Lookout that can locate and remotely erase the device, or just sound a siren until the holder trashes it. Some utilities can go into /system and persist against wipes as well.
6: If the device has a SD card, consider using an EncFS app to mount and store files under. This way, anything written is immediately encrypted.
7: Use Titanium Backup Pro with encryption and saving to a remote cloud provider. TB's encryption is remarkably sane (it uses private/public key, so the passphrase is only needed on a restore), and storing copies of backups remotely means that data is still obtainable even if the phone is lost. It does require root though.
8: Unless directly in use, keep USB and ADB completely off until needed.
9: Use a utility that demands a PIN before various apps can launch, especially preferences and an app that pops up a console/shell window.
10: Use a TRIM utility that runs in the background. This way, if the data isn't encrypted, it is not existing.
These will help protect data on a phone. If stolen, the attacker would have a few guesses on the PIN before the device locks them out. A reboot will force the attacker against the full passphrase. A data wipe will still mean Cerebus or a security program is still in /system, forcing the thief to completely reflash the phone to a factory image (ensuring all is gone.)
Of course, there is the physical hardware loss, which insurance might cover (Asurion for example), and stored data can be recovered via Titanium Backup. However, done right, an Android phone can be made decently resistant to theft or physical attacks.
The reason why one should use a utility to PIN protect apps and app groups is that if the phone is swiped before the screen locker comes on (for example, out of the user's hands directly). That way, assuming preferences and other settings are secure, a thief has limited run on what is available on the phone.
Rooted? (Score:2)
For rooted phones there are both a variety of backup options and variety of stolen phone options all of which you can locate in the Play store, or which can be found by simple Google search, since the options are discussed endlessly with their pros and cons on every major Android forum.
For unrooted phones, you can still fully encrypt, and still backup -- although not fully. How painless the recovery is will come down to how much you trust and buy into online services. Your Candy Crush progress is going to
Re: (Score:2)
> if you decided to integrate with Facebook, or if you've got your tinfoil set to max.
Given Facebook's long history of privacy violations, I do believe there's a *few* steps on the dial between those options...
Re:Rooted? (Score:5, Insightful)
Re: (Score:3)
Did you ever think that some of the Ask Slashdot topics exist to provoke discussion rather than to seek knowledge?
If you depend on media corporations to prompt you to take care of basic things in life, you really do have a severe problem with the way you live.
So... that's a "no" then.
Laughably Easy? (Score:5, Interesting)
Citation needed for the "laughably easy to defeat 'Find My Phone' and 'Remote Wipe' options". How are these laughably easy to defeat? Do tell. Also iphones have a kill switch installed, so they can't be wiped and reused. Compare this to your android solution of asking slashdot. I await more information.
Re:Laughably Easy? (Score:4, Informative)
Pretty easy. (Score:2)
Re: (Score:2)
And getting past the PIN? And how useful would an iPhone be without Wi-Fi/Cellular Internet connectivity?
You can't even restore the firmware without it verifying with Apple. Unless it is an old model that can be defeated offline, it would be more valuable for spare parts.
Re:Pretty easy. (Score:5, Informative)
You can use an alphanumeric password on iOS. You do t have to use a 4-digit pin.
Re: (Score:2)
First, you can set the password to much longer than 4 characters.
Secondly, any parent can tell you that even without "wipe after 10 failed attempts" turned on, the iPhone will not allow you to enter PINs continuously. You'll start getting increasing delays fairly quickly, including delays that are quite long.
Re: (Score:2)
Incorrect - iPhone passwords can be alphanumeric, of any length you want. It ~defaults~ to a 4 digit PIN, but you aren't limited to that. Mine's 8 digits.
Furthermore, anyone who cares will have enabled the 'wipe after 10 failed attempts' option.
Re: (Score:2)
Re: (Score:2)
Good luck restoring iOS to that device and making it usable as anything other than a stylish paperweight, if it was running iOS 7 and had Find my iPhone enabled.
Re: (Score:2)
It's as simple as: Power down device, remove battery, remove SIM, do not re-connect to wifi hotspots. All of which can be done by anybody in less than 45 seconds. If the battery is non-removable? Power down, remove SIM, don't use wifi. Find my phone and remote wipe are pretty much a big hilarous joke if the theif know how to handle phones.
iPhones wipe themselves unless the correct PIN or fingerprint is entered. I think you get 5 tries.
So congrats. You've powered it down and kept it off networks. As soon as you power it back on you're still stuck on the lock screen.
Actually, that's not true. You can unstuck it. If you take it online and let it talk Apple...
Re: (Score:2)
It's as simple as: Power down device, remove battery, remove SIM, do not re-connect to wifi hotspots.
Why work so hard? Just turn on airplane mode.
Of course, if the phone is password-locked, getting the data from it requires some hardware and software knowledge. If it's also encrypted and the password is a good one, the data is safe.
Re: (Score:2)
Citation needed for the "laughably easy to defeat 'Find My Phone' and 'Remote Wipe' options". How are these laughably easy to defeat?
It depends on how the user's phone is set up.
If the phone is not password-protected, it's laughably easy: put the phone in airplane mode. As long as the thief does that before the owner can get to a web browser, the thief can peruse the data on the phone at leisure.
If the phone is password-protected but not encrypted, it's a little tougher. Airplane mode still blocks "Find my Phone" and "Remote Erase", but actually getting at the data is harder. If the thief can't guess the password within a few tries t
Re: (Score:2)
Note that I only mentioned passwords. Android offers other authentication options, including face unlock, pattern and PIN (arbitrary-length numeric password) as well as alphanumeric password. Encryption requires PIN or password. Face unlock is convenient (once sufficiently well-trained), but not very secure; lots of random people will be able to unlock your phone and pattern is moderately good if you use a complex pattern and make a habit of wiping the screen clean, at least enough to smear out any pattern trails.
iPhone also has alphanumeric passwords and fingerprint password too.
Re: (Score:2)
An offline attack would require a bootrom/bootloader exploit, since you can't get data off the device while it's locked (it refuses to complete the USB handshake). Even in restore mode, USB DFU mode won't dump data, only overwrite.
Android is the same in that respect. With either OS, the attacker can open the device and read out the flash directly, however.
In the other areas you mention Android needs to improve.
Re: (Score:2)
Nope, Starting with the iPhone 3GS, the flash is encrypted. The encryption key used is encrypted with a per-device key that's known only by the device (and I guess, Apple). If you do a remote wipe, the encrypted key is deleted (making the data inaccessible), and a new key is created. The device then encrypts that key with the d
Cerberus (Score:5, Informative)
Re: (Score:3)
flashed into the rom would be fun if they had a random X hours and erase contents mode... Nothing is more enjoyable than knowing you are pissing off whoever bough your phone. I would like random insulting popups as well.
Re:Cerberus (Score:4, Informative)
Note that there was a major security hole in this last year:
http://www.ifc0nfig.com/cerber... [ifc0nfig.com]
And, via SMS commands - ALL FREE (Score:5, Informative)
http://www.xtrasec.com/feature... [xtrasec.com]
These things are often stolen for quick resale (Score:2)
It's not even necessary to find a black market for them since several well-publicized used phone brokers will purchase late model phones for up to $200 US.
I would hire a credit watch company to eyeball my credit inquiries for a year or two, and even that'll get your card suspended if you enter the
Root, Push Whatever (Score:3, Informative)
Don't store important shit on your phone.
When your shit gets stolen, just change the passwords to any accounts it was authorized to.
Don't be one of those idiots who uses 2-factor authentication with one of those RSA hash clock apps on their phone. You'll just end up locking yourself out of shit when you lose your phone.
Encrypting your phone does nothing because you decrypt it every time you power it on, and you always have your phone on, don't you?
Passwords / locks will stop casual thieves from getting in, but they don't want in - they just want to sell the phone.
Passwords / locks will NOT stop thieves who want your information. If your info is worth enough to be targeted it's worth enough for a 0-day bounty. (And with Android you don't even need that - it's likely to be a 6+ month old bug that your manufacturer / carrier never patched / pushed out the patch for).
You may as well ask how to make sure your car can't be stolen. Can't win, don't try. Just minimize the impact.
Re: (Score:2)
Encrypting your phone does nothing because you decrypt it every time you power it on, and you always have your phone on, don't you?
But the first thing any thief will do is turn it off by pulling the battery, so it can't be located. When they next power it on, that encryption might help.
Re: (Score:2)
Moto G you cant pull the battery, Got another tip?
Buy a "Hello Kitty" wrist strap. (Score:2)
Buy a "Hello Kitty" wrist strap. That way you can prevent your phone from being stolen in the first place.
If you want everything encrypted: Sorry, you can't have that.
Re: (Score:2)
Unfortunate when the thieves cut your hand off to get the phone though.
sPh
Re: (Score:3)
Unfortunate when the thieves cut your hand off to get the phone though.
sPh
They could always cut your hand off anyway.
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
Buy a "Hello Kitty" wrist strap for the gun. :D
Re: (Score:2)
They'd likely steal that gun, use it to shoot you, and then steal the phone and anything else you have of value on you in the process.
Re: (Score:2)
Duh, you encrypt the bullets.
Re: (Score:2)
Sounds scary.
Before you know it, those bullets encrypt YOU!
Re: (Score:2)
If you want everything encrypted: Sorry, you can't have that.
Sure you can. All Android versions from Gingerbread (IIRC) forward support full device encryption, using dm-crypt. Of course, it's only as strong as your password, so you have to trade off convenience against security.
Physical security? (Score:3)
Re:Physical security? (Score:4, Informative)
Re: (Score:2)
If the thief wasn't threatening him with violence, he could probably solve his problem by keeping his phone in a zipped pocket when he's not using it.
Re: (Score:2)
Which is also why you need to be aware of your surroundings. Someone starts getting too close to you, cross to the other side of the rode, turn around, and just in general keep people away from you. Make sure your bag is close to you so a moto driver can't zip past and steal it. Common sense like that will reduce thievery.
However, I will say the two attempted pickpocketings i had were in Europe. In Amsterdam I was looking at postcards, and looked down to find a guys hand around my waist (sort of the same wa
Re: (Score:2)
Re:Physical security? (Score:4, Insightful)
Re: (Score:2)
For a lot of people in first-world countries, I doubt they see their phone as much of a status symbol anymore (perhaps a few years ago this was the case, but now when everyone has an iPhone or decent smartphone, the allure of exclusivity kinda disappears) and hence they just use their phone like any other device and don't think too much about it. However in a place like Colombia, a tourist used to having their phone our or easily visible/accessible isn't necessarily aware of how damn poor the environment th
Re:Physical security? (Score:4, Interesting)
Really, I am Colombian citizen and Colombia is a country where people tend to steal your shoes if they are not tied tightly to your feet. Third world denizens tend to carry their expensive equipment in their hands as a show of wealth, and they get marked and the phones are easily stolen. I lived on and off in Colombia for years with expensive phones and never got them stolen. Why? I do not use them on the bus, the bar, or in the street. Stop using your smartphone as a status symbol in public.
This,
It doesn't matter how wealthy the country is, most people get their phones stolen through carelessness. There may be fewer thieves in a somewhere like London or New York compared to Bogata or Medellin, but they're still there and they're still looking for the same thing, an easy mark. The standards are different, everyone and their dog has their phone out in New York or London so they look for the ones that are drunk and alone, of course people do get their phones snatched in public but because everyone walks around with their phones out, they think that it wont be them (and act so surprised when it happens to them).
This is why a lot of first worlder's get stuff stolen when they go to developing nations, they've never lived in a place where you have to be on your guard, where your phone will get stolen if you wander around with it.
I've had a grand total of three things stolen from me in my travels, all due to carelessness on my part but fortunately, nothing that has cost me much to replace.
Re: (Score:2)
Umm.. (Score:2)
Public kiosk (Score:5, Insightful)
I pretty much only log in to anything from my Android tablet via a browser in private browsing mode / incognito. I can then do everything through the browser that TFS' author presumably uses pre-logged-in native apps to do. Email, IM, cloud storage... I use them all, I just don't have my device set up to one-click root-my-life.
I don't even bother with a password on the thing - It wastes more of my time than that of a potential thief. If someone nabs it, hey, they get a few gigs of music (that I have backups of) and a $50 (replacement value - they don't tend to age well) tablet. Woo-hoo.
Re: (Score:3)
I don't even bother with a password on the thing - It wastes more of my time than that of a potential thief. If someone nabs it, hey, they get a few gigs of music (that I have backups of) and a $50 (replacement value - they don't tend to age well) tablet. Woo-hoo.
That's one approach, but I think on balance you're wasting more of your time with your approach. You don't have to enter passwords to unlock the device, but you do every time you want to do anything other than use media already on the tablet. The everything pre-logged-in approach is extremely convenient, and if you put a semi-decent password on it no ordinary thief is going to get into it. If you put a good password on it and enable encryption no one is going to get into it.
secure against theft? (Score:2)
A thermite charge will do (Score:2)
Re: (Score:2)
Re: (Score:2)
IMEI change (Score:2)
Re:IMEI change (Score:5, Informative)
I thought IMEI could not be changed. Is it possible here because on a smartphone everything is software defined?
You can generally do this, if you are super technically inclined, and have the right tools for the phone in question. In almost every case, you have to defeat the security on the baseband firmware, because it's embedded as part of the firmware in what's called a "seczone" (contains security data for the phone, which is cryptographically signed, including the carrier lock and IMEI).
Most of the work required to rewrite the IMEI is not actually done by people attempting to be able to rewrite the IMEI; instead, the purpose is to be able to rewrite the carrier lock which happens to be in the same area, so if you have the source code for the tools, or know how to use IDA Pro and read and modify assembly language, you can convert the tool.
This is basically true of almost every Samsung baseband chip firmware, since it has a buffer overflow attack that works against the cryptographic signature check, and then - game over. This is how the Sony, Samsung, and original iPhones carrier lock was busted. For other phones, you can buffer overflow the firmware by using a specially designed chip that pretends it's a SIM chip, and buffer overflows the baseband from the other side of things, rather than from application space. It's probably worth my while to not go into too much detail here.
A non-stupid company that wanted to disincentivize that level of hacking on the baseband - said hacking also being an effective means of modifying the radio tables for the SDR (Software Defined Radio) - would put the carrier lock up in application space, rather than putting it in the baseband firmware in the first place. Most companies, Apple included, have been pretty stupid about their carrier lock implementations, though.
So yeah, the tools exist, mostly because of carrier lock, and the implementation details for the carrier lock being in a stupid location that makes the IMEI rewrite an easy opportunistic target.
really simple. (Score:2)
Step 1 change gmail password.
Step 2 realize you were dumb for not setting a lock screen code.
Step 3 - buy unlocked Moto X used on ebay for $260 and keep it in your front pocket next time.
Solve the problem at the source (Score:5, Funny)
There's a few simple steps to follow to prevent phone theft in the first place:
Step 1: Wear gloves at all times
Step 2: Put a non-conductive silicon case on your phone
Step 3: Slip phone into pocket
Step 4: Charge up a 400V 10uF capacitor and slip it into your pocket, leads up (now you see the need for gloves).
Then you play a simple game.
1 point for a loud scream on public transit.
10 points for a loud scream followed by self injury while attempting to run away.
100 points if the thief had a pre-existing heart condition.
1000 points for a girl in the vicinity mistaking the agony with simple surprise of your well equipped package and offering to "take you now" right there on the train.
obvious (Score:2)
2. self destruct button with a significant amount of C4 (plus phone insurance)
Simple (Score:4, Funny)
How to prepare for the theft of your Android Phone (Score:3)
First, try not to get too attached to your Android. This can not be stressed enough as it is the absolute most important out of all the steps. Getting attached may feel right at first, but will make separation far more painful for all parties involved later. Despite how you feel about your Android now, the truth is it's highly unlikely you will never get an upgrade.
Secondly, set a lock screen message addressing the new owner of your phone. Try not to make it too bitter sounding, or you will never see your Android again. Leaving your name and address, and times that you are typically at home is not recommended. Instead use something along the lines of, "Please take good care of my Android." Wishing the thief and your ex Android both happiness is a good idea, but you will have to see that message periodically which could lead to separation anxiety or a self fulfilling over the air update.
Third, try to be sensitive to clues that your Android may be about to go missing. If your Android is acting up, freezes giving you the cold shoulder after receiving certain gestures, refuses to listen when you speak to it, suggests things in a mocking way, interrupts you while talking to someone you spend (too much) time with, or just can't make it through the day without a little "boost", these are signs that your relationship with your Android may soon be Terminated.
Additionally, try your best to be a good person. Be aware that your Android is aware of almost everything you do down to the slightest touch or subtle tilt of your head. Thus, mistrust between you and your Android is a sure-fire recipe for disaster. Your android can hear those things you whisper under your breath after ending a call -- it senses how you act towards others you have contacts with. Performing acts of kindness towards others will reduce the chances that your Android will inexplicably leave your company, and can increase the chances of reuniting with your Android after an affair with a thief. If you are reunited after a separation, it will be up to you to decide if you can ever really trust your Android again; Unfortunately, one must beware of viruses...
Finally, if things do not work out with your Android, do not despair. New models with more desirable features and stronger vibration functions will be available soon. Never damage your Android on purpose as this can lead to an immediate break-up, and may cause you harm as well. If you voluntarily end a relationship with an Android, return it to an authorized recycling centre so that it may be refurbished. Remember, if an Android doesn't bring you happiness, it may have been meant for someone else in the first place.
"How Can I Prepare For the Theft of My Android?" (Score:4, Funny)
Save us both some time, and just send it to me...
Re:oops... just wanted to read the comments (Score:5, Interesting)
Instead of cursing the darkness, why not light a candle?
http://soylentnews.org/ [soylentnews.org]
Re:oops... just wanted to read the comments (Score:4, Insightful)
Instead of cursing the darkness, why not light a candle?
http://soylentnews.org/ [soylentnews.org]
Because every time I go to that site, I find it as frustrating to use as beta. Why do truncated comments have to load a new page?
/. classic the first time I encountered beta.
Also I haven't been forced onto beta since I opted for
Soylent news will have to improve to get readership.
Re: (Score:2)
I couldn't believe, when I left New York to go to college, how many people stored things in their back pockets. I used to tell them all the same little rhyme --
(tap front left pocket) wallet pocket
(tap front right pocket) key pocket
(tap back left pocket) pick pocket
Re:How exactly was it stolen? (Score:5, Informative)
Yeah, ever since I started traveling for business on public transport, I no longer keep a wallet in my back pocket. Instead it goes in a front pocket, which is more difficult to pick pocket. Works well with jeans. This doesn't do so well if you are wearing dress slacks with loose pockets, so you'll have to resort to other means like the various types of hidden / zippered pockets.
It's just too easy to have your back pocket searched when riding public transportation. And inside coat pockets aren't much better unless they have a button or zipper.
Backpacks aren't safe either, a good thief can unzip it and look inside without being noticed. I prefer a messenger type bag with a cover that folds over the top and is latched down by snap-buckles combined with velcro. Harder to open quietly and I always have an arm wrapped around it anyway.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
a.k.a. everywhere on this planet, at least
Re: (Score:2)
The wise man accepts reality and makes the best of it and tries to be a good example.
Exactly. He doesn't fantasize about righteously shooting criminals and vigilanteism, especially not to the point of buying a gun. What kind of example would that set? Hint: imagine someone so creepy they natter on about hoping they get hit by a car 'cause they really really really want to sue someone to bankruptcy/death. Then they launch into a comparative description of which law firms will cause the most damage to the driver. Then they get snippy when you suggest their priorities might be a wee bit off.
Re: (Score:2)
And yeah if the gun is going to come out at all, you are no longer talking about a pickpocket (propety crime).
Nope. It's perfectly legal to shoot a pickpocket in the back as they are walking away (at least in the stipulated Texas).
Re: (Score:2, Insightful)
just look at all the mass shootings, despite all this dick measuring about the need to have guns not one of those gun toting citizens ever has the balls to actually get in the firing line when shit goes down but the american solution is "need more guns!".
It literally would only take a few seconds to find hundreds of cases where someone with a concealed handgun stopped a mas shooting. But I am sure you don't actually want any facts to interrupt your rhetoric...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Well I don't know about the Android version of this feature, but on the iPhone, the "wipe after 10 failures" option puts an increasing delay between attempts. Once you get to the last few attempts, the delay is pretty long (I think 30 minutes or an hour, per attempt), so it's pretty unlikely even a kid would trigger it, unless the phone was left alone with them for a long time.
Re: (Score:2)
I dunno. Even if you have kids, for many people the phone is with them 24 hours a day, so kids would be unlikely to get their hands on it for an extended period regardless. My phone is in my pocket during any time I'm awake, and when I'm asleep it's 30 cm from me on my bedside table (at which point the kids are asleep anyway).
Keep in mind there's normally a delay on the "wipe after X failures" options on phones, such that the kid would need to have the phone for several hours in order to reach the limit. I'
Re:Android Has Full Device Encryption (Score:5, Funny)
Enable the "Wipe after X failures."
I presume you don't have kids :-)
Or you teach them that certain things are not toys. Why, maybe you even keep those things out of the kid's reach! Wow! Y'know, like every real parent has done throughout the ages. Knives, matches, car keys, stoves, cleaning chemicals, really there are things much worse than cellphones out there.
Confirmed. He's never had kids.
Re: (Score:2)
Enable the "Wipe after X failures."
I presume you don't have kids :-)
Or you teach them that certain things are not toys. Why, maybe you even keep those things out of the kid's reach! Wow! Y'know, like every real parent has done throughout the ages. Knives, matches, car keys, stoves, cleaning chemicals, really there are things much worse than cellphones out there.
Confirmed. He's never had kids.
Or he's a true helicopter parent, not leaving the kids out of his sight for even a second at a time. However your assessment is the more likely.
Re: (Score:2)
Yes. Kids are invincible. They will defeat their parents at every turn and will never listen to reason. Attempting to raise them is pointless.
You really never have had kids... or even been around kids... or even remember being a kid if you honestly think it's that easy. No kids don't listen to reason because they don't fully understand the concept of reason and if you dont understand that, you dont know much about raising kids.
I haven't got kids, but helped my sister out with my nephew for a while. Yes kids will find a way into things, not because their evil, unreasonable or stupid, but because they are curious and attracted to shiny things (o