• GeneralPixel 6a
  • Unsubstantiated claims about Cellebrite contradicted by Cellebrite

I just finished going through the documents for anything related to GrapheneOS and Google Pixel in general, and in conclusion:

  • There are 0 mentions of GrapheneOS in any of the documents.

  • Halmstads TR B 894-23 Aktbil 451, Protokoll - åtalspunkt 1.1 - 1.pdf has a Cellebrite Extraction Report for a Pixel 6a running Android 13, page 292. Again nothing about GrapheneOS.

  • Halmstads TR B 894-23 Aktbil 449, Förundersökningsprotokoll - åt.pdf contains primarily the interrogations of the suspects. One of the topics they are questioned about is, as the interrogator describes it, a "a Pixel phone, i.e. an encrypted mobile phone?"

    One mention of the Pixel 6A phone (page 607, in Swedish):

Pixeltelefon – BG28335-1
Asad har på sig två mobiltelefoner både då han är på Hoom hotell samtidigt som dig och då
han grips efter det att Nawaf blivit skjuten. Han har en Iphone som är hans sedan tidigare,
men han har även en Google Pixeltelefon på sig. Varför har man en Pixeltelefon, dvs en
krypterad mobiltelefon? Var har Asad fått tag i den? Vad användes den till? Varför gick Asad
runt med två mobiltelefoner då ni befann er i Stockholm? Vem ringde och chattade på denna
Pixeltelefon?

Beyond this there is absolutely nothing even remotely related to GrapheneOS so I think we can safely conclude that it never had anything to do with it at all. I presume OP was confused by the description of the Google Pixel phone as "an encrypted mobile phone" and mistook it for being a reference to GrapheneOS.

    The information on iOS is laid out differently and is harder to understand without the context of further information about what Cellebrite means by the terms they use in the tables. It shows they can do the same kinds of stuff they can do for most Android OEMs but it's taking time for them to add the latest generation(s) for all capabilities. The latest iPhones seem to fair slightly better against them than stock OS Pixels but likely mainly because they still need to catch up.

    Also, they can essentially do full filesystem extraction with the lock method provided for anything but we have no interest in that and consider it quite silly that other companies heavily hype up their ability to extract data from GrapheneOS if you unlock the device, enable ADB and authorize ADB access to their product. Not a big deal. There could theoretically be builds without developer options, etc. but it doesn't actually matter and we don't care about the marketing angle to waste resources on it.

      DeletedUser29

      Beyond this there is absolutely nothing even remotely related to GrapheneOS so I think we can safely conclude that it never had anything to do with it at all. I presume OP was confused by the description of the Google Pixel phone as "an encrypted mobile phone" and mistook it for being a reference to GrapheneOS.

      Their post makes specific claims about GrapheneOS versions and Cellebrite software version.

      @"Rarry What are you basing all of these claims on? It's apparently not these documents, and it doesn't match information we have from elsewhere that's not public.

        GrapheneOS Indeed. And considering the suspects complete lack of opsec (e.g. there are a lot of pictures of them brandishing guns with their faces fully visible) it is doubtful the police needed any sophisticated methods to access the phones.

          DeletedUser29 It looks like the author wrongly assumed it was about GrapheneOS because in one report it is written "encrypted mobile phone" when it was a Pixel 6a on Android 13, I don't think the Police used sophisticated methods either when I see the band of idots on the pictures, I wouldn't have had the patience to examine over 1000 pages in Swedish as you did, thanks for your feedback.

            Xtreix Oh I didn't read all the pages. Ctrl+F did a lot of heavy lifting, so it was mostly a matter of parsing through the keyword hits to see what the context around them were. Which as I said had nothing to with GrapheneOS and mostly concerned "where/why did you have this phone and using Signal to talk to these people?".

            I also have the fortune of both speaking Swedish and rather liking doing stuff like this so I'm glad it was of use :)

              de0u
              Don’t worry about it.

              We have millions of native speakers who can’t construct a simple declarative sentence in grammatical English.

              Your english is fine.

              GrapheneOS
              Thank you for the valuable information.
              This information is very helpful to me.
              I would like to investigate in detail Cellebrite's ability to crack smartphones such as Samsung and Apple and each generation of Pixel.
              I would also like to know more about the state in which each device can be unlocked, the type and speed of brute force.
              If you would like, could you please share the official Cellebrite documentation on this forum or send it to my email address below?
              Thank you.
              My email address:
              onionnetworkside@protonmail.com

                OnionNetworkSide there are people working their ass off to get that kind of information and you think they just share to someone unknown such specific information?

                I would encourage GrapheneOS to keep thr details and specifics to themselves, let those forensic companies die in their rage ;)