this post was submitted on 21 Mar 2026
6 points (100.0% liked)

No Stupid Questions

4041 readers
61 users here now

There is no such thing as a Stupid Question!

Don't be embarrassed of your curiosity; everyone has questions that they may feel uncomfortable asking certain people, so this place gives you a nice area not to be judged about asking it. Everyone here is willing to help.


Reminder that the rules for lemmy.ca still apply!


Thanks for reading all of this, even if you didn't read all of this, and your eye started somewhere else, have a watermelon slice ๐Ÿ‰.


founded 3 years ago
MODERATORS
 

Is it much different than something like iMazing?

top 3 comments
sorted by: hot top controversial new old
[โ€“] 5PACEBAR@piefed.ca 5 points 4 weeks ago

Cellebrite DOES use undisclosed and unpatched vulns (zero days) to access the device's memory. It absolutely automates hacking a locked phone.

Those kind of capabilities are way out of reach for consumers as those kind of zero days can get security researchers big bounties. I'm sure Cellebrite have their own security researchers.

[โ€“] slazer2au@lemmy.world 3 points 4 weeks ago

That is up for debate as it is a secret kept by the company.

Best guess would be doing some kind of buffer overflow over USB to allow the tool to read the entire storage.

[โ€“] twjolson@lemmy.world 3 points 4 weeks ago

Cellebrite had a couple products, and they work different.

UFED basically is a backup creator. It use to do more, but Apple and Google security are so go, they basically only use the communication method available in the phone.

Their premium product, Inseyets UFED, is more capable. It uses unknown exploits to accomplish several objectives on the phone - from gaining access to run other exploits, to gaining access to the full file system.

How do the exploits work? No one outside cellebrite knows. If those details got out, the explicit would get patched, and cellebrite would have to find another exploit.