This will open up a multitude of possibilities. Will it be a virtual machine?
When it comes to disk encryption on computers, is BitLocker considered secure? Does it have any backdoors?
Are Veracrypt and Picocrypt safe options?
Fixing the door would require the phone to be turned off and put into BFU mode.
There are some companies who claim BFU Physical extractions, mostly on very insecure MediaTek devices and some Samsung Exynos devices. This extracts everything but the data extracted is still encrypted... so it needs a brute force anyways. There isn't a "master key" because that key is created and derived from the user credential which you need to know. It's advertiser speak.
Take a look at this video MSAB made:
https://www.youtube.com/watch?v=8Y9PZzHu_3U
Notice it says "XRY Pro has allowed me to *BRUTE FORCE* that device" at around 1:20 despite the narrative in the title and the video? Shameless...
A good amount of Samsung devices do have brute force support though as documented in our last doc publications and in this video. More reasons why a dedicated secure element like the Titan M2 is very valuable.
Very good. Thank you again.
If there were still phones with removable batteries that could be charged outside the device, it would open up a lot of possibilities. Just a little soldering could permanently disable the USB port.
I was informed that there are manufacturers whose smartphones can be unlocked even in BFU mode, possibly because they provide some sort of master key, with Samsung being one of them. Is this information accurate? Excluding Apple and Google, which manufacturers would offer better security against forensic devices?
Scheduling the phone to automatically switch off at certain times (for example, every three hours) can be helpful if a Cellebrite or Greykey machine isn't available right after the smartphone is seized.
There'd be no realistic concerns. Attack surface is miniscule, even in a hot state it needs a pretty thorough exploit chain and would need to be bespoke to a target. I don't recommend keeping a device seized and returned in the state it's returned in anyway. I'd disable any network access, take any important files out (you should have backups) and reset it.
Some customers of forensic tools are known to implant spyware into seized devices when returning it. Serbian law enforcement did it, but those came with the prerequisite of having the device unlocked by their Cellebrite tool to install it. The spyware in question appeared to not be provided by Cellebrite either. No access = no install.
Some forensiccompanies had tools that implanted spyware on AFU devices to keylog the PIN/Password when they could not access the device, such as GrayKey's Hide UI for iPhones. Hide UI alone was known to be buggy and problematic. It also didn't deliver the PIN remotely and required seizing it a second time when first revealed.
https://wccftech.com/how-fbi-uses-graykey-and-hide-ui-to-unlock-iphones/
Graykey moved away from being just for iOS devices a long time ago though.
OS updates and device differences can intentionally (and more often unintentionally) break how exploits work. For example Pixel 9 was unsupported by Cellebrite despite no major security changes, and only just became supported this February.
They'd likely put their focus on finding an exploit for the secure element to allow faster brute forcing.
Is the Hide UI installed even with the iPhone locked (AFU)?
I heard about recent cases of modern iPhones being unlocked even when the user is using a complex password with special characters. Is there any other explanation besides the Hide UI?
What risks does a smartphone that has been subject to forensic analysis but has not been unlocked due to being examined in a cold state pose when returned to the user?
If you have the choice to use anything then SimpleX is gold standard. Signal is excellent if the phone number requirement isn't a problem for you. We heavily recommend https://molly.im/ for Signal users. Provides many privacy and security features Signal misses.
Session is good but disappointed with the lack of PFS. We disagree with their stance that it is not important. Exploiting someone's device gives access to their current encryption keys but if there is PFS then it doesn't imply recovering all past messages. It's great that they're honest though.
Thanks for the clarifications.
Using a messaging app linked to a phone number is never a good idea.
Is it possible for the operating system to provide IMEI spoofing for the mobile network? And at the system level, apart from MAC spoofing in the case of Wi-Fi, are other identifying signals hidden from applications?
Depression is undoubtedly a product of social/food/sexual engineering. In the field, fornication leads to 'instant karma,' and the guy literally loses productivity. In the case of the prostitute, even with the fridge full, she might end up simply forgetting to eat or not wanting to prepare food properly, or because she's a feminist and doesn't cook, and definitely because of the compulsive state that consumes her.
Recipe for depression:
Methylfolate + lithium dimethyl bicarbonate + magnesium dimalate
Or simply eat kale; also adding the basic dose of beef liver, whole salt, and fruits.