Hacker News new | past | comments | ask | show | jobs | submit login

Couple of notes on this:

52 devices could mean a phone, a tablet, and 50 USBs, SD cards, and such.

The problem with loading firmware to permit is the potential damage to the evidence and the potential to imply that the evidence was planted.

The vast majority of the cell phone hacking involves loading material into at least into memory and often modify the boot load sequence. This is how all that I worked with (e.g., Cellebrite, Magnet, MSAB, Oxygen, AccessData) function.

damage: I have toasted devices by hooking them up to forensic tools, mobile phones and more.

planted evidence: There have been several challenges to this (I think US v. Ganias), and let's not forget the Casey Anthony trial where they argued that the forensic tool CacheBack reliability. Not surprisingly, F/LOSS tools are better defense for this than black-box commercial ones.

The more complex the evidence collection, the more likely damage can occur, or planted evidence can be argued.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: