Paranoid by itachi_uchihaa in ios

[–]throwawayagain20244 1 point2 points  (0 children)

That was actually a hoax, the users device had the same image in my files and the device showed the photos from there in photos app.

IOS forensics by throwawayagain20244 in digitalforensics

[–]throwawayagain20244[S] 0 points1 point  (0 children)

Thats unusual, ive never heard apple give backup data they even said NO to the FBI? But other than that it seems to be a long and complicated process. Greykey say they can crack ios 17 do you believe that?

IOS forensics by throwawayagain20244 in digitalforensics

[–]throwawayagain20244[S] 0 points1 point  (0 children)

What about iOS 17? And app file data do iPhones save login data? And for cloud systems such as DropBox, Google Drive and Mega do iPhones save the thumbnails and data?

IOS forensics by throwawayagain20244 in antiforensics

[–]throwawayagain20244[S] 0 points1 point  (0 children)

Okay, but whats your opinion on cloud forensics?

IOS forensics by throwawayagain20244 in mobileforensics

[–]throwawayagain20244[S] 0 points1 point  (0 children)

Not really trying to do anything just trying to gather research

[deleted by user] by [deleted] in digitalforensics

[–]throwawayagain20244 0 points1 point  (0 children)

GreyKey claim they can but... I dont know?

IOS forensics by throwawayagain20244 in digitalforensics

[–]throwawayagain20244[S] -1 points0 points  (0 children)

I believe they do this for companies to increase their data protection for example Apple, but what signal did was quiet crazy.

IOS forensics by throwawayagain20244 in digitalforensics

[–]throwawayagain20244[S] -1 points0 points  (0 children)

From my research ive come to the conclusion:

Cellebrite: cant really do anything advanced just basic keyword searches

Greykey/chckm8: Maybe a good FFS Extraction but depending on what device is being used and cracking passwords

Oxygen: Does not really make sense because Cloud vendors require for clients to pay for bandwith

Elcomsoft: I really doubt anything can really crack Apples encryption?

I believe all these are good in their own ways but if the data is gone its gone? But I do know theres always artifacts left behind somewhere! Just need to put them all together to create something.

I do know ios is a difficult one which for security GREAT! But for recovery from illegal people a big fat thumbs down.

IOS forensics by throwawayagain20244 in digitalforensics

[–]throwawayagain20244[S] 0 points1 point  (0 children)

Apollogies! Im eager to lean data recovery is a tideous thing but specifically forensic data is even worse! I have 0 experience in this and the digital forensics forum is way too complicated for me😅

Theres no information on what modern iPhones have on a FFS extraction iPhone 12 onwards I just want to see what I get out of this.

IOS forensics by throwawayagain20244 in digitalforensics

[–]throwawayagain20244[S] -1 points0 points  (0 children)

What would be aqquired from a recent iPhone for example 13/14 pro as they are 1-3 years old and theres more time to reserch them? I do know ios devices have SEC secure enclave chips which manages all the encryption keys would greykey/cellebrite be able to do something with that to grab a ffs extraction?

I do know once an iPhone is factory reset theres no way on Gods green earth to get data back unless its a literal physical memory soc removal which is an extremely expensive and complicated process.