(no title)
ajphdiv | 5 years ago
It can be used to decrypt other's files as long as there is physical access to the device and the user's passcode. This was published as a result of the Bezo's phone examination report, where the author stated it was impossible to decrypt the media file. A claim that was largely refuted by the digital forensics community.
enitihas|5 years ago
stmL|5 years ago
unknown|5 years ago
[deleted]