Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This doesn’t apply to mobile devices, since it’s not feasible to remove the internal storage device and take a bit-perfect image of it using another computer. You need to plug the device into a Cellebrite kiosk, trust Cellebrite to send read-only commands over the USB interface, and trust the device firmware not to write data when it receives those commands.


> trust Cellebrite to send read-only commands over the USB interface, and trust the device firmware not to write data when it receives those commands.

So most of these suites really just automate the backup extraction process and the automated analysis piece.

In the real world, you don't interface down at the USB interface other than just to kick off a backup (think an iTunes or adb backup) of the device and just grab it via USB then extract it on your computer and analyze it.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: