Page 1 of 1

— We would like it to be so that others don’t see it

Posted: Tue Feb 11, 2025 7:09 am
by relemedf5w023
— We need to come up with a way for the agent to notify us that the documents have been planted so that we can retrieve them.

- Well... Today there are a lot of ways. For example, post an ad on a dating site, write some pre-agreed nonsense on a social network.


— There is an option to use a gift card, for example, in the S coffee shop chain. We have access to their payment database and see the numbers of gift cards. Your person receives a discount card in advance. Even by mail. This is a completely legal service. And then he buys coffee. Well, and we track when this card was paid for. And depenSecurity Tales: Open Smartphone
Vladimir Bezmaly | 01.11.2019
Autumn was amazing this year. The golden leaves in the park fell slowly, slowly, swirling in an autumn waltz. Johann loved this time of year. He would leave home early for work to take a walk in the beautiful park. Especially since the city service finally realized that only the sidewalks needed to be cleared, and the golden carpet covering the ground could lie there until spring.

Ah, how wonderful it was to feel like a little boy again, walking through the park and kicking up the rustling leaves with your feet. You could finally think alone. And the task was strange. Johann recalled yesterday's conversation.

- Johann, we need your help again. We need to open someone else's smartphone. But the problem is that we have practically no time to pick a complex PIN code.

- That is?

— The person we need will be at the opera house with his wife. We can provide you with his smartphone for an hour or an hour and a half, but no more. Can you help?

- I think so. But! We need to get his fingerprints somehow. Which hand does he use to unlock his smartphone?

- Right.

- Now think about how to get prints.

— Will the prints on the glass work?

- Yes. Only the glass should preferably be smooth.

- Of course. We'll give you his prints tomorrow.

- That's great. We'll need a pickpocket specialist who can steal his smartphone and put it back, a room in the theater where no one will bother us. Naturally, we need to be there in advance.

- Of course, everything will be done.

And then tomorrow came. Even though everything went hong kong whatsapp data during the exercises, Johann and his men were still worried.

At the appointed time, a glass was brought to them. The team leader, Ferenc, photographed the fingerprints with his smartphone and ran the photo through a new application to extract accurate data. Then a physical copy of the fingerprint was created, which was able to "fool" the smartphone. The necessary data was copied, after which the smartphone was returned to the owner. The specialists spent 20 minutes on the entire process of "cloning" the fingerprint, and even less on downloading the data.

ding on when and where it was paid for, we understand what time and where the meeting is scheduled. In the same way, your agent can raise an alarm. And since there are quite a lot of such chain restaurants and cafes, you can use not only the chain that I suggested. The main thing is that we have access to it. In advance.

- What a great idea, Johann! I always feel like we underpay you!

— Me too sometimes.

The CIA used a similar method to meet with agents in Starbucks , McDonalds and some other chains.