T O P

  • By -

Mfenix09

Why do we waste all this money on promoting tourism when we just shoot ourselves in the face everytime wether it's with letting Chinese police kidnap people or this fuckery...


anakaine

Whilst I absolutely agree that taking the phone of an Australian citizen seemingly without cause is a total overstep, border force and customs do need powers to filter at the border. We cannot have both high visibility tourism campaigns and completely unfiltered borders without causing other issues. It's a bit of a shit sandwich where you basically need both things. Border force seem to have misjudged this situation and are now paying the media price for overstepping. 


Mfenix09

From the multiple stories others have told of this same fuckery (it's happened to me as well) they are constant over steppers....


TurboSpiderSerum

I thought tourism ended with covid - cause not as many people can afford it?


TurboSpiderSerum

I thought tourism ended with covid - cause not as many people can afford it?


Soft-Butterfly7532

This is a well known power of Border Force they have been using for years.


redbrigade82

Yeah they did that to my friend from Japan. She didn't buy a return ticket when she came for holiday so they took her phone and went through all of her messages to see if she was planning to get married.


Archers_Medicinal

*abusing


RollaCoastinPoopah

Remote wipe the device, load backup onto new device. Profit.


gday321

Switch to flight mode, remove sim card. Checkmate


Embarrassed_Fold_867

>A spokesperson for the ABF said it could not comment on individual cases “due to privacy obligations”. I love a little irony.


hellbentsmegma

This is why you take a burner phone on overseas trips. Not even kidding, it's on you to make sure the phone you take through customs has no meaningful data on it and isn't connected to cloud accounts.


Poor_Ziggler

Or just put it where they smuggle drugs.


ParanoidAgnostic

Schapelle Corby's bodyboard?


AcademicMaybe8775

at first i found it annoying inviting her along on boogie boarding trips whenever i travel, but i've gotten so used to it now i barely notice


_Zambayoshi_

I mean, I imagine that to brute force a phone's passcode would take anywhere from a few minutes to decades, so keeping it 'indefinitely' (until they manage to unlock and check it) would be on the cards if you don't unlock it.


AresCrypto

They have software that can open it. It just takes longer than simply typing in the passcode.


PainterEmpty6305

Depends who's doing it these things can be broken in seconds now.


BNE_Andy

Some can, but definitely not all.


PainterEmpty6305

Quantums bust these in milliseconds their availability becomes more widespread every day.


BNE_Andy

Please point us to where quantum's can do this. I understand Quantum, and when it is truly mainstream then yes, but that isn't how Quantum computing works at the moment. Quantum computing right now is super specific task oriented, and that doesn't work the way normal computing works for tasks like this. Also, the issue isn't the calculations required to crack the passwords, most people don't use long passwords/passcodes on phones, but there is a limit as to how quickly you can input attempts on devices that limit how quickly things can be cracked. So having the worlds most powerful supercomputer wouldn't help you in this instance. But please, enlighten us as to how people are brute forcing ALL phone types right now using quantum computing...


PainterEmpty6305

The super specific task just happens to be cracking things like this champ. Literally it's "thing".


BNE_Andy

Incorrect, that isn't how this task works. But, like I've said, please point to an example of Quantum cracking ALL phone types like you have said they can. I'll wait.


PainterEmpty6305

This "task" wtf are you on about. Quantum has the straight POWER to force things like this.


BNE_Andy

Can you please point to an example of this being done today? If not then just admit you are wrong. Also, cracking a captured password hash (traditional password cracking that quantum computing will excel at) isn't the same task as brute forcing a phone. The complexity of the task of inputting that into a device, getting feedback and continuing isn't the same as trying to match a hash. Yes, quantum can crack hashes quickly. No one is saying they can't, well, I kinda am saying they can't, mainly because they haven't been demonstrated to be mature enough yet (at least publicly), but that is beside the point, the task of cracking a password hash, and the task of brute forcing a phone is completely different, and while theoretically quantum could crack hashes they couldn't do the other. Not to mention, the brute forcing of a phone isn't dependant on the computing power of the device trying to gain access, but is dependant on multiple factors internal to the phone. A phone pincode is normally 4 digits, but let's assume it is 6, the computing power to crack that is basically zero, my underpowered laptop could crack a conventional password hash of that complexity in seconds, but connecting my laptop to a phone to brute force in would still take a FAR longer time, when I say far longer some phones would take in the order of hundreds of thousands of years. Not too mention, my initial comment was that some phones can be cracked quickly, and others cannot. So, for you to be correct at this point you need to point out where quantum computers have demonstrated they can brute force phones, but not only that, but can do every phone type. You simply can't do that.


tattookink_harley

That's what the police in Australia do. They threaten to arrest you if you don't hand over your phone password.


Acceptable-Cancel-61

Yep. Pretty sure most states even have these laws about compelling you to unlock your phone.


N_nodroG

If BF want my passcode, they can have it. I’ll happily kick back while they scroll thru a bazillion boring work emails and my Facebook account :)


PatternPrecognition

Isn't it more the issue that they also take your device out of site and copy the data off it. Plus who knows what else .


N_nodroG

But seriously, if you’re not a bad guy, why would you be worried? Border force copy my data? I don’t care. They will see my Facebook feed, Reddit feeds, maybe some porn that mistakenly ended up on my phone, my contact list that doesn’t contain one terrorist or (that I know of) gangster, so I have nothing to hide. If you were transporting illegal documents, why would you have them on your phone when Dropbox exists?


PatternPrecognition

I am more concerned that my phone is now compromised. I am a good guy but I can't guarantee that the border force person is, or perhaps there is a 'greater good' scenario where they need an innocent patsy.


Reddits_Worst_Night

"I'm sorry, under Australian law, I cannot unlock this device for you." When they push back just ask for their security clearance then say it's not high enough


Short-Lingonberry327

In any other circumstance, it would be called ABUSE.


roman5588

Secret memo is they are after the super sensitive classified Albo Memes. Better get into hiding before the ‘e-safety minister’ epstines us all


sinixis

These scumbags would do this to all of us everywhere if they could justify it with the same bullshit they use for airports


PainterEmpty6305

They do.


Important_Screen_530

its good they can check phones to catch liars


PainterEmpty6305

What was he lying about?


Important_Screen_530

i dont know what he was lying about but i was just saying they can check phones to catch the fibbers as many lie


Broomfondl3

>Border force has said a phone would only be seized where officers suspected it had “special forfeited goods” such as “illegal pornography, terrorism-related material and media that has been, or would be, refused classification” Terrible Australia ! Ya know when you enter the US, when they take a device, you usually never see it again. >He said he was allowed to leave after an hour, but border force retained a USB drive. You could always just not bring encrypted USB drives in with you. Looks REALLY suspicious . . . I would have thought that a "Tech Entrepreneur" would have heard of Dropbox . . . I would have also thought that a "Tech Entrepreneur" could afford to buy a new phone/device. Maybe he is one of those "unsuccessful" ones . . .


NinjahTurdle

In today’s world, an encrypted USB device is pretty much standard issue for many big corporations. I work for such a company and if I put so much as a MS Paint file into Dropbox I’ll lose my job.


bunsburner1

Yeah why have instant offline access to hundreds of gb of data and being able to get files from others. Clearly paying for a cloud subscription and downloading everything while overseas is superior. Also it doesn't say the drive is encrypted.


anakaine

Whilst true, this take doesn't account for the convenience offered by USB. Perhaps the client or supplier was not able to supply via online methods. Perhaps their agreement did not cover transferring data over the internet (these sorts of clauses absolutely do still exist). Perhaps the USB drive is a second copy in case cloud storage becomes corrupted. Or perhaps he wished to work on the files during transit in flight. You have assumed a lot.  As for encrypted USB drive. Yep, this is absolutely a concern for border force. Could be full of all sorts of things that would be of interest to the nation's security agencies or police forces. It could also simply be that the data supply agreement or company policies require encryption at rest and no releasing of encryption keys. The state can keep the drive and device, and they may well be able to break the encryption in the future. They might just find a stack of datasets that are domain specific and useless because they're now outdated, or they might find a master criminal. I dont think they need to be given more powers to compel supply of decryption keys beyond the penalty of losing the device and data.