Comment on Leaked Cellebrite Tool Docs Reveal List of Phones That Can Be Unlocked
Adanisi@lemmy.zip 5 months agoIn a before-first-unlock state they absolutely are bruteforcing, since the filesystem is encrypted. The exploits are for bypassing the retry limit in that case.