Friday, March 25, 2016

Samsung GS7 locked bootloader, Cellebrite forensics & custom ROMS question...

Cryptome.org published court documents from Cellebrite, the company suspected of helping the FBI break into the phone in the Apple-FBI crypto case, revealing technical details on the methods they use to recover data from locked iPhones, Samsungs and Blackberries.

Document is available here: http://ift.tt/1RBg1E2 (about mid-way through after jurisdiction arguments is where it gets juicy).

In general, all Cellebrite approaches seem to rely on a custom bootloader, injected into the system a variety of ways (in the case of a Blackberry using a fairly sophisticated trio of exploits).

In the case of Samsung, it appears to be a USB attack vector while the phone is running (as opposed to the iPhone which must specifically be turned off before it can be exploited).

With the new lockdown status and forced signing on the Samsung Galaxy S7, question for the advanced devs here: Do you think this changes the effectiveness of Cellebrite's overall method?

Specifically, is their whole approach of a custom bootloader rendered moot with the newly enforced security or, interestingly, is the approach by Cellebrite possibly applicable to loading custom ROMs on the S7?


via xda-developers http://ift.tt/1UhuETn

IFTTT

Put the internet to work for you.

Turn off or edit this Recipe

No comments:

Post a Comment