Elcomsoft claims its iOS Forensic Toolkit can now extract certain pieces of data from an iOS device before it has been unlocked.
Almost all of the data stored on an iPhone or iPad is securely encrypted after a reboot or restart — until a passcode has been entered. But the little bit that isn’t, which includes keychain records, can now be obtained.
Apple has made a couple of changes in iOS 11 that make it more difficult for cops to get into your iPhone. We discovered one of those last month, and now another has been uncovered by security software developer ElcomSoft.
It makes it even more difficult for law enforcement to obtain the data on your iPhone, even if they have your fingerprint.
Blame for the flood of celebrity nude photos that hit the Internet has been rotating from the pervy hackers that ripped the pics, to Apple, to the creator of iBrute, but while the FBI and Apple continue to investigate the source of the leak, there’s one tool that has gone unmentioned: the police forensic tool that made it all possible.
One of the key elements behind the iCloud nudes leak is a piece of software created by Elcomsoft that allows attackers to impersonate a target’s iPhone and download its entire iCloud backup, and you don’t even have to be a cop to get it.
The security features built into Apple’s iOS software are so good that the police are unable to gain access to defendant’s iPhones when they need to. Apple itself is able to bypass the security software and decrypt locked devices — and it do so when the police request it. But the company has so many requests that it has to add police to a lengthy waiting list.