A San Diego pimp arrested last year for a long alleged list of prostituting women and girls has made tech news because of his Samsung Android smartphone.
You can read the crazy details of the arrest and Dante Dears pimping lifestyle (which is an interesting read, for sure), but his phone’s notoriously soft security “pattern lock” has kept the feds at bay. Dears refused to unlock the device and police couldn’t search it without a warrant. The phone was sent to a FBI lab but technicians were unable to gain access of the contents of the memory simply because of the pattern lock feature. This particular security feature hasn’t always been noted for it’s strength.
The techs tried enough times to break the pattern code that it forced locked the entire phone and could only be unlocked with the owner’s Google account credentials. The FBI was then forced to serve Google with a warrant to release a whole list of information.
- How A Pimp’s Android Pattern Lock Foiled The Feds (gizmodo.com.au)
- Pimpin’ Ain’t Easy… Unless You Have An Android Phone With Pattern Lock (cultofmac.com)
- FBI demands Google unlock Android phone of “Pimpin’ Hoes Daily” founder (venturebeat.com)