^
"For example, a law enforcement official could tell the suspect they can call their lawyer or take some phone numbers off the device. Once the suspect has done this, even if they lock their phone again, Hide UI will have stored the passcode in a text file that can be extracted the next time the phone is plugged into the GrayKey device. Law enforcement can then use the passcode to unlock the phone and extract all the data stored on it."

One question I have for people familiar with iPhone hardware is how it is possible to transfer files or install an app of any sort while the phone is locked? Is the cache partition not protected by Secure Enclave?

@john_b
For example, in normal circumstances when you plug in a locked iPhone to a Mac or PC, what happens?

Android phones (at least all the ones I've used) will show a storage device and assign it a drive letter, but it will not mount until the phone is unlocked and you press "allow".

@voltronic Yep, all my experience is with Android, and it's exactly as you describe.

Debugging connections also don't work until you unlock the phone and allow the host to connect.

@john_b
I can confirm, from my years of rooting and playing around with alternative OSes.

@voltronic @john_b Do you consult, my company Obsidian Intelligence is manufacturing a new encrypted phone, we are just getting our first test models with the custom Qualcomm chip we designed in a few weeks would be interesting to see what you could uncover to help us identify attack vectors and fix them before we go into production

Follow

@killabit
No, this is not at all my area of expertise. I can follow directions from XDA just fine, though! 😆

@john_b

@voltronic @john_b finding good people is so hard right now, the struggle is real appreciate you being honest though!

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.