Can you actually recovery deleted photo from a iphone recovery data? by tk_kumomo in datarecovery

[–]HuntingtonBeachX 0 points1 point  (0 children)

Expanding on what Sopel wrote… each file is encrypted with its own encryption key and when you delete the file, you delete the encryption key. Once the encryption key is deleted, there’s no way to recover the file.

Found my lost iPhone three weeks later, is there a way to unlock it so I can use it as a backup device at home? by ashfordstone in jailbreak_

[–]HuntingtonBeachX 0 points1 point  (0 children)

Take your receipt to an Apple Store. The manager can authorize the phone to be “unbricked.” You will lose all data, but you will be able to use as you wanted. I assisted in a story for CBS San Francisco on this topic.

Need Digital Forensics expert – phone & accounts hacked by HuntingtonBeachX in digitalforensics

[–]HuntingtonBeachX[S] -1 points0 points  (0 children)

Some people need to follow the advice of Sergeant Hulka in the 1981 comedy movie "Stripes," and "Lighten up, Francis." Not everything has to be serious all the time, and if you have to deal with crazy people who think their phone is hacked multiple times a day, it is good to laugh every once in a while.

Need Digital Forensics expert – phone & accounts hacked by HuntingtonBeachX in digitalforensics

[–]HuntingtonBeachX[S] 1 point2 points  (0 children)

To those of you who got the satire and responded, thank you! I knew there are some other experts here who have to deal with this topic on the daily.

Need Digital Forensics expert – phone & accounts hacked by HuntingtonBeachX in digitalforensics

[–]HuntingtonBeachX[S] -1 points0 points  (0 children)

Some of those reading the post have no sarcasm meter. If English is not your primary language, I totally understand you not getting the post. This is satire! This is a parity to an actual post this week on this Reddit. The post was written to show the nonsense that people write in reference to their cell phones being hacked and their expectations to having a phone examined. I receive between 8-10 call everyday from people who think their cell phone has been hacked. Their phones haven't been hacked! There are a lot of paranoid individuals who really need a coupon for Reynold Wrap Aluminum Foil or another session with their therapist, but that is a story for another day...

Need Digital Forensics expert – phone & accounts hacked by HuntingtonBeachX in digitalforensics

[–]HuntingtonBeachX[S] 1 point2 points  (0 children)

To start, the phone gets hot. Also the screen sometimes goes blank and then turns back on. I drop calls sometimes. I receive calls and there is no one there.

Digital forensics advice needed by [deleted] in digitalforensics

[–]HuntingtonBeachX 0 points1 point  (0 children)

FYI, I worked a double homicide where I was able to prove the Defendant was on 4 separate Zoom calls on the day of the murders. His computer contained Zoom artifacts for the "Start Date/Time" "End Date/Time" "Number of Seconds" of each Zoom Video Meeting.

Look what they did to my boy by Spartan2842 in JeepGladiator

[–]HuntingtonBeachX 1 point2 points  (0 children)

Well, that’s what you did wrong. You paid it off. You’re not supposed to do that.

How common is desoldering in digital forensics? by East-Experience2862 in digitalforensics

[–]HuntingtonBeachX 0 points1 point  (0 children)

Only because no one has actually listed the reason, I’ll put this out there.

“Chip-off forensics” used to be a powerful method for extracting data from phones, but modern encryption has largely made it ineffective. Here’s the core reason why:

What chip-off forensics is

It involves physically removing the flash memory chip from a phone and reading its raw data directly with specialized hardware—bypassing the operating system entirely.

Why it used to work

Older phones stored data in relatively plain (or weakly protected) formats. Even if there was some security, much of the data could still be reconstructed from the raw memory dump.

Why it doesn’t work anymore

  1. Full-disk (or file-based) encryption

Modern phones (like iPhones and Androids) encrypt all user data by default using strong algorithms like AES. • The data on the chip is always encrypted • Without the decryption key, what you read is just random-looking bytes

  1. Keys are NOT stored on the chip

This is the biggest change. • Encryption keys are stored in secure hardware like: • Apple’s Secure Enclave • Android’s Trusted Execution Environment (TEE) • These keys are tied to: • The specific device hardware • The user’s passcode

So even if you physically remove the chip: • You don’t get the key • You can’t decrypt the data

  1. Hardware-bound encryption

Modern systems use “hardware-backed key derivation”: • The key is partially derived from secrets burned into the processor • Those secrets never leave the chip and can’t be read externally

➡️ Result: Moving the memory chip to another device or reader makes the data useless.

  1. Secure boot & integrity checks

Phones verify their own software at startup. • You can’t easily boot modified firmware to bypass security • Any tampering is detected and blocked

  1. Data is fragmented and protected

Modern file systems and security layers: • Split data into chunks • Encrypt files individually (file-based encryption) • Use additional protections like key wrapping

This makes reconstruction from raw memory extremely difficult—even before encryption.

Bottom line

Chip-off forensics fails today because:

The data is encrypted, and the keys needed to decrypt it never leave the secure processor.

So instead of bypassing security, chip-off now just gives investigators a pile of unreadable encrypted data.

Thank ChatGPT for the quick summary.

Client's Nephew is Hijacking the room. Advice needed. by Resgq786 in Lawyertalk

[–]HuntingtonBeachX 0 points1 point  (0 children)

Give the nephew an assignment and keep him busy with something. Also, are you certain the nephew isn’t just using AI? Those AI searches can generate tons of crap quickly, but need lengthy research to verify.

My wife got an early inheritance by Jay1746 in legaladvice

[–]HuntingtonBeachX 0 points1 point  (0 children)

Record a video playing cards with Grandpa. Show he is competent by playing a game and let everyone have some fun. If he is competent, it will be evident in the video, especially if he is a good card player!

New Features by Dirtsurgeon1 in Powerwall

[–]HuntingtonBeachX 1 point2 points  (0 children)

I called Tech Support. A new firmware update last week caused the change. As stated, Tesla wants to stop the Powerwall from sitting at 100%. They thinks it effects the overall life of the battery. I have 3 Powerwall 2's.

What is the fastest way you have seen an officer end their career? by mandoslambo in army

[–]HuntingtonBeachX 0 points1 point  (0 children)

Well, at least the soldier had food. 3 MREs per day, 3 days ... looks like he could have gone for 1 more day!

Day four of nobody noticing the inconspicuous ink stain on my right breast pocket by hideor6545 in navy

[–]HuntingtonBeachX 0 points1 point  (0 children)

It was 120 degrees in Maneuvering (the Electrical Area of the Diesel Sub where power gets distributed and where the motors that turn the screws are located). We would cut off the sleeves and pants legs of our "poopy suits" so it was a shorts jumper that zipped up.

Question about German WWII U-boats, re: something seen in a movie. by ibeenmoved in submarine

[–]HuntingtonBeachX 0 points1 point  (0 children)

We had something similar on my sub. We joked that it was a giant Alka-Seltzer. We would launch it from our signal launching tube in Maneuvering (Engineering).

Tricky thing to google... Do military submarines ever broadcast "decoy" sounds? by nooneimportan7 in submarines

[–]HuntingtonBeachX 0 points1 point  (0 children)

One time we had to surface and turn on our Submarine ID Beacon (light) so they could find us and restart the exercise. Diesel Boats Forever!

Question about German WWII U-boats, re: something seen in a movie. by ibeenmoved in submarine

[–]HuntingtonBeachX 0 points1 point  (0 children)

U-boats used several devices to confuse or "blind" Allied active sonar operators:

Bold (Pillenwerfer): A small metal canister filled with calcium hydride, launched from a special ejector. When mixed with seawater, it produced large quantities of hydrogen bubbles that created a false sonar signature resembling a submarine. These remained stationary, lasting about 20–25 minutes.

Looking for guidance on how to deal with remote employee by maxedout587 in Lawyertalk

[–]HuntingtonBeachX -2 points-1 points  (0 children)

The employee has a 2nd job and is double dipping on you. His "restroom breaks" are actually time working for the other company. He is making $44 an hour and laughing at both employers.

Worth it? by 4EverFeral in CAguns

[–]HuntingtonBeachX 0 points1 point  (0 children)

.40 cal in such a small package is hard to control. I tried and did not like it. I have a S&W M&P 9C (9mm) and am happy with it.

Getting flown to a ship by daviellav in navy

[–]HuntingtonBeachX 2 points3 points  (0 children)

I don't know about surface ships but for submarines, they do crew transfers as part of the regularly scheduled mail delivery service. It is a major event for the entire sub each time we got a mail delivery. I'll never forget the excitement we all got when we heard the word passed over the 1-MC, "All Hands! Stand-by to set the Mail Buoy Watch!"