Long time no see guys. I lost access to my old account. If @jonah or someone could help me that’d be awesome.
Anyways, I have recently had the opportunity to review a legal case involving multiple federal agencies trying to unlock a iPhone 14 Pro Max.
New things I’ve learned without saying too much:
- BFU iPhone (13+) using a iOS Beta = Fort Knox (yes, even a 6 digit pin although I don’t recommend). This doesn’t mean they can’t attempt to find your password another way
(data breaches, ATM Pin, eavesdropping, another less secure device, loved one knowing the password, birthday guess, CCTV, etc.)
But they are less likely to attempt anything unless their forensic suite actually supports it.
- Old iPhone graykey matrix is 100% accurate. Consent = not even a BFU extraction possible.
- iCloud ADP is essentially a road block. If iMessage is involved it’s important for all parties to have ADP enabled.
- If graykey can’t break into a iPhone, 9/10 Cellebrite can’t either.
Recommended approaches as of today:
- Install iOS Developer betas as soon as they’re available
- Use this new discrete BFU shortcut (no buttons required, looks like normal tapping and swiping)
- Alphanumeric password, use Face ID in public to avoid eavesdropping.
- iCloud+ , ADP , and 3 max password attempts before instant wipe (Find My Bypass) is inconvenient but still a solid choice if you don’t trust the future of iPhone security. I mentioned it here.
- Keep in mind Graykey Preserve is a new device that halts the inactivity timer introduced in iOS 18, preserves cached location data, BIOME and KnowledgeC records, and recently deleted messages or photos. These would usually be purged after 7-30 days automatically by iOS. This only applies to AFU and is useless if phone is already BFU.
- Upgrade your iPhone at least every 3 years
If you don’t feel like reading all that. Keep your iPhone near you as much as possible! Turn your iPhone off before seizure! Don’t hold onto the same iPhone for 6 years! Use iCloud ADP!