According to the documents, Cellebrite could not unlock any iPhones running iOS 17.4 or newer as of April 2024, labeling them as “In Research.” For iOS versions 17.1 to 17.3.1, the company could unlock the iPhone XR and iPhone 11 series using their “Supersonic BF” (brute force) capability. However, iPhone 12 and newer models running these iOS versions were listed as “Coming soon.”

The Android support matrix showed broader coverage for locked Android devices, though some limitations remained. Notably, Cellebrite could not brute force Google Pixel 6, 7, or 8 devices that had been powered off. The document also specifically mentioned GrapheneOS, a privacy-focused Android variant reportedly gaining popularity among security-conscious users.

Links to the docs:

iPhone

Android

GrapheneOS has a thread about this on Mastodon, which adds a bit more detail:

Cellebrite was a few months behind on supporting the latest iOS versions. It’s common for them to fall a few months behind for the latest iOS and quarterly/yearly Android releases. They’ve had April, May, June and July to advance further. It’s wrong to assume it didn’t change.

404media published an article about the leaked documentation this week but it doesn’t go into depth analyzing the leaked information as we did, but it didn’t make any major errors. Many news publications are now writing highly inaccurate articles about it following that coverage.

The detailed Android table showing the same info as iPhones for Pixels wasn’t included in the article. Other news publications appear to be ignoring the leaked docs and our thread linked by 404media with more detail. They’re only paraphrasing that article and making assumptions.

We received Cellebrite’s April 2024 Android and iOS support documents in April and from another source in May before publishing it. Someone else shared those and more documents on our forum. It didn’t help us improve GrapheneOS, but it’s good to know what we’re doing is working.

It would be a lot more helpful if people leaked the current code for Cellebrite, Graykey and XRY to us. We’ll report all of the Android vulnerabilities they use whether or not they can be used against GrapheneOS. We can also make suggestions on how to fix vulnerability classes.

In April, Pixels added a reset attack mitigation feature based on our proposal ruling out the class of vulnerability being used by XRY.

In June, Pixels added support for wipe-without-reboot based on our proposal to prevent device admin app wiping bypass being used by XRY.

In Cellebrite’s docs, they show they can extract the iOS lock method from memory on an After First Unlock device after exploiting it, so the opt-in data classes for keeping data at rest when locked don’t really work. XRY used a similar issue in their now blocked Android exploit.

GrapheneOS zero-on-free features appear to stop that data from being kept around after unlock. However, it would be nice to know what’s being kept around. It’s not the password since they have to brute force so it must be the initial scrypt-derived key or one of the hashes of it.

42 points

Nice to see some benefit to updated vanilla AOSP, Graphene, and other options.

It goes without saying but it seems like a deeply fucked business model to horde zero-days that could cause billions in damage or safety issues if they fall into the wrong hands, in order to keep your mercenary surveillance product working.

permalink
report
reply
39 points
*

Mfw Samsung on android 6 is the most secure 😮. Wonder if it has something to do with the mid boot password option that was around

Edit: Downvoted in 10 seconds wtf

permalink
report
reply
35 points

Mfw Samsung on android 6 is the most secure 😮. Wonder if it has something to do with the mid boot password option that was around

More likely: So old, no point in even attempting, therefore not supported.

permalink
report
parent
reply
13 points
*

That’s taking “security through obscurity” to a whole new level.

permalink
report
parent
reply
12 points

I think it’s probably a demand issue. There’s just not that many devices running with that Android version, and it takes a lot of time and money to pay engineers to find and use extremely complex state of the art exploits.

permalink
report
parent
reply
19 points

So security through obscurity

permalink
report
parent
reply
13 points

Right. If you’re a sufficiently wanted criminal, I’m sure they could custom an exploit for you. You’re not really secure.

Probably not economical to include it in their normal package.

permalink
report
parent
reply
37 points

The document also specifically mentioned GrapheneOS

Okay…what’d it say? Baffling that the author didn’t think that was important…

permalink
report
reply
33 points
*

I mean, the doc’s are available through the link. But here’s some screen grabs:

AFU: After First Unlock

BFU: Before First Unlock

BF: Brute Force

FBE: File Based Encryption

FDE: Full Device Encryption

FFS: Full File System

permalink
report
parent
reply
5 points

:(

permalink
report
parent
reply
11 points

Android user? Graphene looks like it’s worth the setup process more and more. Pixels are the only Google product worth while thanks to Graphene really.

permalink
report
parent
reply
2 points

The only docs I saw pertained to iOS.

permalink
report
parent
reply

Just like the link in the iOS section, there’s a link in the Android section. Both were in the first sentence, I believe. But I had to give the article another once over to find it.

permalink
report
parent
reply
24 points

It says it’s immune since 2023 updates

permalink
report
parent
reply
5 points

Nice, thanks

permalink
report
parent
reply
1 point

Use a long password and you’ll be immune from their before first unlock brute force.

Passcodes are trivial to break.

permalink
report
reply
2 points
*

Incorrect. Read the links.

Edit: I missed the “first”, you’re not saying fully immune. My bad.

permalink
report
parent
reply
-4 points
*

They’re exploiting vulnerabilities and back doors not brute forcing your passcode. The only way you’re keeping them out is with hardware encryption which the iPhone has and probably why it’s the only one not vulnerable. Hardware encryption also won’t matter if your vendor shares their keys with law enforcement. As far as I’m aware, Apple is the only one that’s gone to court and successfully defended their right to refuse access to encryption keys.

Don’t put anything incriminating on your phones.

permalink
report
parent
reply
8 points
*

In a before-first-unlock state they absolutely are bruteforcing, since the filesystem is encrypted. The exploits are for bypassing the retry limit in that case.

And the manufacturers don’t have your encryption keys. They’re unique.

permalink
report
parent
reply
7 points

Huh? None of this makes sense to me. Apple and Google do not have encryption keys for your device, regardless of hardware or software. When your phone is unlocked, the key and/or hash is in memory, and may be key wrapped, regardless of hardware or software. iOS is listed as vulnerable to the attacks, minus the latest devices and versions, which is pretty much the norm with lagging development. Same woth latest Pixels. Where are you getting this info from?

permalink
report
parent
reply
3 points
*

The Secure Enclave is a component on Apple system on chip (SoC) that is included on all recent iPhone, iPad, Apple Watch, Apple TV and HomePod devices, and on a Mac with Apple silicon as well as those with the Apple T2 Security Chip. The Secure Enclave itself follows the same principle of design as the SoC does, containing its own discrete boot ROM and AES engine. The Secure Enclave also provides the foundation for the secure generation and storage of the keys necessary for encrypting data at rest, and it protects and evaluates the biometric data for Face ID and Touch ID.

https://support.apple.com/guide/security/hardware-security-overview-secf020d1074/web

The FBI wanted access to Apple’s encryption keys which they use to sign their software. They don’t have ‘your’ encryption keys, they have their own that the FBI wanted to use to bypass these features. They eventually dropped it because they found a zero day exploit which apple fixed in later versions. That is why the newer phones aren’t vulnerable (yet).

https://en.wikipedia.org/wiki/Apple–FBI_encryption_dispute

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 4.8K

    Posts

  • 84K

    Comments