This is not a good news folks. Cellebrite can now do data extraction of the iPhone 4S, 5, 5C, 5s, 6 and 6 Plus. This means that the company behind the hack that allowed the FBI to peer into the San Bernardino bomber’s iPhone 5c can now do the same thing on devices that are known to have a much tighter security. People now wonder how they managed to do it.
Did they bypass the secure enclave? They probably are not able to force it but perhaps they did find a way to go around it. This is bad news, as we know, that Cellebrite might be great at finding hacks on iPhones, but they are not that great at securing their data. This information comes from Shahar Tal, Director of Forensics Research at Cellebrite.
Cellebrite's CAIS now supports lawful unlocking and evidence extraction of iPhone 4S/5/5C/5S/6/6+ devices (via our in-house service only).— Shahar Tal (@jifa) February 22, 2017
That 12-digit pass code seems more and more tempting in order to get that device of yours secure…