A sample iPhone device chip-off
We all know the importance of physical dumps of mobile devices. Only the physical dumps allow an expert to retrieve the maximum of data from the examined device. The physical dump extraction becomes a pressing issue, when we need to examine a screen locked device or damaged device. Unfortunately, the physical dump extraction from Apple mobile devices is a huge problem. At conferences among colleagues, there are rumors that someone was able to extract data from an iPhone using the chip-off technique. This is the truth and a lie at the same time. The thing is that starting from iPhone 3GS, Apple mobile devices are encrypted, meaning that the use of the chip-off method does not make any sense. Some experts suggest to use the brute force method to decrypt physical dumps of Apple devices. However, if you are familiar with the Apple iOS Security document, you will understand that it is meaningless to decrypt these dumps using the brute force method. The chip-off...