Comment on Nearly two-fifths of robberies in London last year were for mobile phones

<- View Parent
dotslashme@infosec.pub ⁨10⁩ ⁨months⁩ ago

Not an expert in any way, but I would assume it is similar to having physical access to a computer. You would not be able to get into the existing device or retrieve data, but if you have stolen it and just to use the device, there are numerous tools to allow side loading of new blobs, that will bypass any restrictions.

source
Sort:hotnewtop