Hacker News new | past | comments | ask | show | jobs | submit login

Right, but that implies you can construct an entire chain that doesn't include checking their phone. Just pointing out, per the post i was replying to, it's not simply use the phone, get other evidence, don't worry about the phone's evidence being thrown out.



That's literally what it is, except "get other evidence" means "construct a plausible story that gets you to the same point".


No, that's not the case here. You don't need a parallel construction in this example, because the UFED extraction (even if tainted by a similar exploit) wasn't illegally obtained.


Didn’t know that, thank you!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: