"Magnet Forensics stole from me," Sawyer told Motherboard in a phone call. When one company used publicly available code made by Jon Sawyer, a mobile security researcher, he characterized it as theft. ![]() Some companies also steal exploits from other hackers, either by reverse-engineering products or by pinching trade secrets, Zdziarski added. Read more: Backroom Trading Phone Cracking Devices Is Sketchy As Hell "I've been approached by some companies early on and I've called them out publicly in the past, in law enforcement circles, for trying to get me to violate certain copyrights and send intellectual property that didn't belong to me." "What I've seen is bribery: trying to pay-off certain employees at a company for information," Zdziarski continued. ![]() "Mobile forensics is a cesspool," Jonathan Zdziarski, a forensic scientist who has worked in the industry, told Motherboard in a phone call. Dominated by corporate giants, one of which has cornered the market for mobile phone cracking technology in the US, and also home to plenty of smaller shops, the mobile forensics trade is littered with unsavory episodes.
0 Comments
Leave a Reply. |