Even more because simply attaching the phone to a USB port allows complete access to the internal memory and SD card regardless of whether a password is entered.
No, it doesn't. You get access to
So the obvious answer is that, if you want security, don't root your phone. It should be kinda obvious that if you can do what you want with the phone via USB, so can any application running on your PC.
Even if you're not kernel-rooted chances are (depending on the phone) all the hacker has to do is bypass your lock screen to enable usb debugging and root the phone himself.
How do you suppose the phone company knows what cell you're in, so they can route calls to your phone? How do you suppose they get their E911 data?
As long as you have the thing powered on, the phone company know where you are. And if the police want to know, they won't go to your house, hack your computer, and read the log backup. They'll just go to the phone company with a subpoena.
This whole controversy was much ado about nothing. The only thing that was different was that the user had access to the data that "the man" had all along.
Yes because the only people who would be interested in this data are those that already posses a legal method of obtaining it...
...but I'd like to run some tests regarding these findings.
Mostly I'm curious about the state of these files on boot. Are they like their names suggest and simply caches of recent lookup results and empty on boot?
Change.org seems to think they are down because of the Amazon issues:
Uh oh.
The Internet is misbehaving
Change.org is currently unavailable due to a problem at our hosting provider, Amazon Web Services. You can follow Amazon's status here.
New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman