When a company like Cellebrite or GrayKey use their devices to break into your iPhone, it’s not just your local data that can be accessed. Using various types of “cloud forensics” or cloud extraction technology, they can get your data in the cloud as well. It’s a long read but worth it.
Cellebrite’s UFED Cloud Analyzer, for example, uses login credentials that can be extracted from the device to then pull a history of searches, visited pages, voice search recording and translations from Google web history and view text searches conducted with Chrome and Safari on iOS devices backed-up iCloud.
Apple has blocked GrayKey, an iPhone hacking device used by law enforcement. The company designed iOS 12 with protection against it.
But Motherboard reports that Grayshift is confident that its device is future-proof.
In this episode, Bryan Chaffin and Jeff Gamet talk about how Amazon has quietly become the Cyberpunk king. They also discuss Tim Cook’s choice of dinner companions for the White House’s state dinner, and how Grayshift’s data breach is the proof in the pudding that backdoors and cracks get mishandled.
And the data breach resulted in a semi-public attempt at extortion by the not-very-good-at-extortion thieves.
The GrayKey box is available only to law enforcement, but it’s a perfect example of why strong passcodes for our iPhones are so important.
John Martellaro and Andrew Orr join Jeff Gamet to talk about why longer iPhone passcodes are becoming more important, plus they discuss the GrayKey iPhone hacking device available to law enforcement.
John Martellaro and Bryan Chaffin join Jeff Gamet to talk about Apple’s microLED facility in California, plus iPhone security and the GrayKey hacking device.