Equin0x 161 Posted October 26, 2022 Share Posted October 26, 2022 https://www.forensicfocus.com/webinars/mediatek-extraction-physical-acquisition-with-file-based-encryption/ We often hear that digital forensics can access anything these days but sometimes that just isn't the case. This attack still ultimately required knowledge of the users passcode to succeed. Every attack I've seen has needed either that, or needed the device to be after-first-unlock state to extract the keys. It seems that as long as a device has a reasonably long passcode and is in before-first-unlock state, forensics will not have much luck getting any data off it. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now