Close ad

Cellebrite will remember this year only in good terms. Before the affair with the company Apple no one had heard of Cellebrite, after it was found out that they were the ones who managed to get into the iPhone of the San Bernardino terrorists, the company's name was all over the world's media. It was Cellebrite that the FBI allegedly paid to help them break into the terrorist's iPhone. After several days of trying, they succeeded, but information about what they managed to get from the phone was never made public. However, now a document has appeared on the web that describes exactly this. 

This data was managed to be obtained by the ZDNet server, which subsequently posted it on the website. The file is called "extraction reports" and is full of interesting information. There are many tabs in the list and they show what can be extracted from the phone and what changes have occurred since the last connection. Extraction takes place when a proprietary UFED device is connected. This device is primarily intended for downloading information from the targeted device. In exceptional cases, however, the device can restore recently deleted data from the connected phone.

The data seen in the published listing comes from an iPhone 5 running the old iOS 8, which was also not password protected. Cellebrite claims that this system can handle up to an iPhone 4S. Once you have a newer device that has a classic code, the system is said not to get into it. You can read detailed information about this technology and procedure here.

 

iphone-passcode-fb

Source: Macrumors

Today's most read

.
  翻译: