- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 71字
- 2021-06-24 16:39:06
Encryption
On iOS devices (starting with the iPhone 4), the entire filesystem is encrypted with a filesystem key, which is computed from the device's unique hardware key. This key is stored in effaceable storage, which exists between the OS and hardware levels of the device. This is the reason that Joint Test Action Group (JTAG) and chip-off methods are not useful acquisition methods, as the entire data dump will be encrypted.
推薦閱讀
- DevSecOps敏捷安全
- INSTANT Windows PowerShell
- 代碼審計:企業級Web代碼安全架構
- Python Penetration Testing Cookbook
- ARM匯編與逆向工程:藍狐卷·基礎知識
- 密碼朋克:自由與互聯網的未來
- 大數據安全治理與防范:反欺詐體系建設
- 網絡安全攻防技術實戰
- 深入探索區塊鏈
- 網絡空間安全技術
- 網絡安全等級保護2.0:定級、測評、實施與運維
- 0day安全
- 網警說安全:網絡陷阱防范110招
- Hands-On Application Penetration Testing with Burp Suite
- 精通Veeam Backup&Replication(原書第2版)