How do destroy a memord card and a phone
Started by
hellodave123
, Sep 30 2007 05:01 AM
#16
Posted 07 October 2007 - 12:23 PM
#17
Posted 07 October 2007 - 12:27 PM
Well, joesquire, lets not jump to conclusions.
This reasoning might however, prevent us from assisting the user in destroying the memory module.
Can we please here from other forum officials?
This reasoning might however, prevent us from assisting the user in destroying the memory module.
Can we please here from other forum officials?
#18
Posted 07 October 2007 - 12:33 PM
there isnt any other reason i can think of other than that....this person obviously has something to hide at least
Edited by joesquire, 07 October 2007 - 12:34 PM.
#19
Posted 07 October 2007 - 12:35 PM
wow, very interesting, never thought about that. Like facedown98 said, let's not jump to conculsions here... could be anything.
#20
Posted 07 October 2007 - 12:36 PM
yeah fair enough, i shouldnt really judge
sorry =D
sorry =D
#21
Posted 07 October 2007 - 12:38 PM
The phone company knows what numbers were called, received, length of the calls, and, what cell towers were used, which gives an approximate location of where the calls were made or received. The phone company also knows every voice mail, text mail, web access, GPS info etc etc. In other words, your jealous girlfriend cannot get anything on you, but a ticked off policeman with a warrant can. Joesquire- let's not idly speculate why this user is so intent on his non-existant privacy. The rest of you, remember nothing you do on the net (or your cell phone) is private. Do not do anything you don't want to discuss with parents, teachers, your pastor, employer or spouse.
Johanna
My daddy always said. "Never write what you can say, never say what you can nod your head to."
Johanna
My daddy always said. "Never write what you can say, never say what you can nod your head to."
#22
Posted 07 October 2007 - 12:54 PM
As Johanna has correctly stated, all information that Law Enforcement would require is available to them through the phone's service provider. This information is tied to the phone number, so everything ever done using this number is available and is not limited to just the actual handset, but all of the handsets ever tied to this number.
Destroying the handset's components will effectively protect any information stored on it from J.Q. Public, but any law enforcement agency with a warrant will have access to all pertinent information.
Destroying the handset's components will effectively protect any information stored on it from J.Q. Public, but any law enforcement agency with a warrant will have access to all pertinent information.
#23
Posted 07 October 2007 - 02:29 PM
I have to say this is making me laugh. Seems all the conspiracy theorists have decided to set up camp here. Not that I'm obligated to answer the rather over-exaggerated speculation, but it's nothing even close to illegal info as someone coined it. It's just something I'd rather not have shared, anyone with a girlfriend and a camera phone will understand the worries. Yes, I am very paranoid and don't need to go to these lengths but, hey, thats my prerogative.
It's worrying to think that a person can't seek help without speculation about their motives.
It's worrying to think that a person can't seek help without speculation about their motives.
#24
Posted 07 October 2007 - 03:00 PM
You are welcome. Have a wonderful day!
Johanna
Johanna
#25
Posted 07 October 2007 - 06:11 PM
What seems more worrying are the lengths you will go through to get rid of them.
Anyway, take a quick moment and think about the situation. Any reason we shouldn't wonder?
I think we've finished here, have we not?
(Post edited for grammar)
Anyway, take a quick moment and think about the situation. Any reason we shouldn't wonder?
I think we've finished here, have we not?
You are welcome. Have a wonderful day!
(Post edited for grammar)
Edited by Facedown98, 07 October 2007 - 06:12 PM.
#26
Posted 07 October 2007 - 10:39 PM
It's worrying to think that a person can't seek help without speculation about their motives.
If you had explained from the beginning, we probably wouldn't have made a big deal about it. However, As a very large site that deals with security issues, we see a lot of interesting stuff that comes through here. Some of it is out right obvious or admitted to that they are trying to hide something illegal. Others are simply embarrased. Yet others try and obscure the truth. Either way, we have to make a determination and clarification. This enables us to provide, you, the end user, the appropriate help.
The average user won't go to the effort to "retrieve" erased info from a memory card. Less know how to remove the info, much less retrieve it from a phone. People store a large amount of personal info on pda's/cell phones now days. If you delete your contacts, call history, notes, pictures, ect from the phone... The average user will not be able to recover them. In fact, it would take some know how, parts, time, and effort. Not something someone can do in a few min if they found the phone on the street.
Short answer: physical destruction of storage medium is the surest way to erase information. Certain protocols won't allow hdd's and other storage medums (memory cards, thumb drivers, floppies, cd-r's) to leave the premise. They must be run through a industrial shredder.
I hope this explains our position.
Similar Topics
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users