1/12/2024 0 Comments Shareaza forensicsSo it’s possible to use the chip-off technique for data extraction – it’s confirmed by our tests. But some iOS-devices, including iPhone 2G, iPhone 3G, don’t use hardware encryption. Some readers wrote us, that it’s impossible to extract data from any damaged iOS-device. About impossibility in principle of data recovery from damaged Apple devices It’s time to tell you a bit more about what we can do. Kyle_pc_terminator of – man, thank you for this comment. Another possible option would be discovering a side-channel attack that compromised the AES Crypto Engine or CPU in order to reveal the UID. A less risky attack would be using Infrared Laser Glitching. There are some advanced NSA level attacks that can compromise a 4s/5/5c if you want to spend 500k + and hire a company to reverse engineer the silicon of the CPU decapping it with Acid/Ion Laser and probing it. Short Answer is it is impossible to Chip-Off anything above 4s due to Encryption being tied to UID and several other features. Harpreet Singh Dardi, Consultant – Computer Forensics & eDiscovery at PwC How was the decryption done? – Chip off is mostly done in the cases where data is otherwise inaccessible (phone locked, damaged) so the data in the chip would be encrypted and protected by secure enclave. I tried and they ALL ENCRYPTED, except iPhone 3G (very old one) Others wrote, that the data in Apple devices is encrypted (Really? They thought, we didn’t know about it?): ZombieKiller316 of – we don’t know who is it, but we’re sure, he’s a computer forensics professional. Our last article, “Extracting data from a damaged iPhone via chip-off technique”, have received mixed reviews from our readers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |