Hi I am just curious to see where we are at with the security of iOS 18.2.1
Cellebrite Premium July 2024 documentation
Hello, I'm interested in this question, does it turn out that pixel 7 is no longer as safe as pixel 8 and newer before forensic tools?
Why? I mean, what are new information that gives you that thoughts?
- Edited
Matthai
I decided to ask because I saw your answer. «Pixel 8 and Pixel 9 both have Memory Tagging Extension, because they are running Arm v9 CPUs.
Arm Memory Tagging Extension (MTE) was introduced in Arm v9, and is a hardware feature in CPUs designed to improve software security by detecting memory-related vulnerabilities.
MTE helps catch two common memory vulnerabilities - Use-After-Free vulnerabilities, when a program tries to use memory that has already been freed, and buffer overflow vulnerabilities, when a program writes more data than allocated to a memory block.
Memory safety has been a major source of security vulnerabilities for decades. Studies suggest that over 75 percent of vulnerabilities in Android are violations of memory safety.
So I guess if you buy Pixel 8 or 9, you will be pretty secure with GrapheneOS." And I do not understand what this means for me as for the owner of Pixel 7. That the phone is no longer so safe against forensics?
nameuser856 I do not understand what this means for me as for the owner of Pixel 7. That the phone is no longer so safe against forensics?
The Pixel 7 is still as safe as it was against any particular kind of attack. But for some attacks the Pixel 8 and 9 are safer than the Pixel 7.
So people making a purchase decision now might wish to pay more for a newer device, and people very concerned about security might wish to upgrade to get better coverage.
- Edited
de0u It turns out that Pixel 7 is most vulnerable to Cellebrite and similar funds regarding pixel 8?
nameuser856 It turns out that Pixel 7 is most vulnerable to Cellebrite and similar funds regarding pixel 8?
I'm not sure I understand the question. I am unaware of any way that the Pixel 7 is more vulnerable than the Pixel 6. I believe that at present 4 and 5 are considered "should not be used" by the GrapheneOS project, 6 and 7 are OK, and 8 and 9 are better.
That said, a Pixel 8 running an old version of Google's stock OS that is missing patches might be less secure than a Pixel 7 running GrapheneOS that is up to date.
@nameuser856 No supported device running GrapheneOS is vulnerable to exploits used by forensic tools currently. There are no extraction capabilities for the Pixel 7 other than stock OS support which you can see in the original post.
The Pixel 7 has not become less secure, or "no longer as safe", the overall security of the device is still the same as when it had came out. The newer Pixels are just more secure than the older models because they have new security features, the Pixel 7 never had them in the first place. Newer generation devices are more secure by being supported upstream longer. In some cases, newer devices are better because they introduce new security features - like memory tagging for the Pixel 8 and later. Pixel 8 and 6 had large improvements over their predecessor, while certain device jumps like 6 to 7 had very little observable changes.
As of the January 2025 support matrix, the Pixel 9 is unsupported for the stock OS. This is likely due to the Pixel 9 using a different version of the Linux kernel (6.1) and Cellebrite will likely overcome that soon. Small changes in the operating system can slow down forensic companies or exploits being supported immediately, even if they arent a security enhancement. Pixel 9 has some slight security improvements over the 8 because of features available with Linux 6.1 but that's not a device exclusive and would be the same when the previous generations move to Kernel 6.1. The stock OS also isn't using said features.
There's nothing wrong with using a Pixel 7 while it is still supported, but its worth observing that the later generations are better now and in the very long-term. MTE is a huge improvement, the MTE implementation GrapheneOS is the often argued by the devs to be the most important and the biggest feature GrapheneOS ever implemented. People with sophisticated threats in their threat models should use the latest device if they can help it.
final Thanks <3
GrapheneOS does the police even use this? I heared that the police don't even look into a computer even if its fully open sometimes. even if they took it because the person was accused to be in possetion of realy bad pictures. It was a known person like an influencer. In the press they sayed "the convicted is so famous, if he would had this kind of pictures on his computer, than people would know. That must be a lie in my opinion because it was the people who called the police on the person and they wanted to know and the whole reason for the police to come and take his pc was that so many people called the police after he did a lot of suspicious things online, while under watch of thousands of people.
So if the police dont look into a normal win 10 computer which is not encrypted, even in a case with high interest of the public, even if the data on the pc is the only thing case related, do they actuall use things like cellebrite, where they actually have something to do like plugin the device and probably have some work to do, even the ai scans the content?
I ask also, because i heared a few times, that the police is not able to access an iphone 6 with an 8digit passcode.
I heared that from people, from whom the police took they're phones.
Or is cellebrite brand new?
Or am i right and the police just don't use it even if they could because mabe they have too much on schedule and only use cellebrite when there is pablo escobar himself?
DeletedUser119 We have the latest January 2025 documentation, we just don't want to risk having the leak closed by continuing to publish it directly even as screenshots rather than only publishing the information.
They have support for the newer iOS versions. The new iOS releases either don't create new barriers for them or don't hold up to beyond a few months at most and that hasn't changed. Pixel 9 stock OS hasn't been exploited by Cellebrite yet as of January 2025 but that's likely only because they have to add support for the specific Linux 6.1 kernel branch it's using and haven't done it yet. No reason to think it's going to hold up for more than a few months, there haven't been any major improvements.
- Edited
You're posting a lot of highly inaccurate speculation and claims. Not clear why you think devices don't have data extracted. Cellebrite has been around offering this for years and their tools are widely used around the world by governments, not only for law enforcement. There are several other forensic data extraction companies with widely used tools, mainly MSAB (XRY) and Magnet Forensics (Graykey). The tools are widely available and widely used. They are not only used in special circumstances but rather as standard operating procedure around the world. It's also not limited to law enforcement. These are not the only type of widely used commercial exploit tools, but remote exploit tools are much more rarely used and not generally going to be widely distributed / accessible to low-level cops, border guards, etc.
I ask also, because i heared a few times, that the police is not able to access an iphone 6 with an 8digit passcode.
This is generally the case with an iPhone 12 or later / Pixel 6 or later if the device is turned off. That's shown by the Cellebrite Premium documentation we posted here and is still the case in the January 2025 Cellebrite Premium documentation. If the device isn't in the Before First Unlock state, they can get all the data with Cellebrite Premium for either an iPhone or Pixel regardless of the lock method unless it's a Pixel running GrapheneOS. We have an 18 hour locked device auto-reboot timer by default and Apple recently added a 72 hour timer in October 2024 for iOS 18.1 likely at least indirectly inspired by our feature since several of them followed us on Twitter (may not be active there anymore) and the idea was propagated around everywhere after we shipped it in June 2021.
GrapheneOS If the device isn't in the Before First Unlock state, they can get all the data with Cellebrite Premium for either an iPhone or Pixel regardless of the lock method
Don't they still need to brute force the PIN or passphrase, even if not throttled by the secure element/enclave?
Titan_M2 If they exploit the OS while in the After First Unlock state, they get all the data from profiles that are not at rest with the exception of a small amount protected by hardware keystore keys set up to require the device being unlocked, etc.
GOS I was wondering how mac os would fair against cellebrite, would BFU on mac os make any difference in ease to gain access? I was also gonna ask as I saw in an earlier post you mentioned mac os's "brute force" security was improving and could be nearly compared to an early phone model. Do you see a future where mac os has "brute force" security that can rival modern iphone's? (I know sandboxing is an issue currently) Thanks.
jamesman3932 The hardware and firmware security is similar to iOS but credential-based encryption is opt-in and the software is significantly less secure. It should already have largely comparable brute force protection to iOS. It is easier to exploit it though and it doesn't have the recently added locked device auto-reboot feature added in iOS 18.1 in October 2024.
I wonder if the iOS vulnerability used by celebrite has been fixed in 18.3.1. Apple’s description of the patch is that it is related to accessibility:
A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
Bozo Although we wouldn't know until we have updated leaks from Cellebrite, it kind of sounds like both Apple and Google might now this past month have patched the vulnerabilities Cellebrite were exploiting. Maybe.
If that is the case, GrapheneOS probably loses one of its major sales points of being the only OS to resist these attacks. Even if GrapheneOS is still doing it better, by actual hardening to prevent whole classes of vulnerabilities, not just fixing a specific vulnerability.
I am actually a bit surprised why neither Apple nor Google have fixed this earlier. For companies like them, surely, it shouldn't be that hard to get access to the Cellebrite software, one way or another.
ryrona Apple appears to have patched a bypass for their USB restricted mode mitigation. They do not appear to have stopped Cellebrite exploiting USB when it's still enabled. Look up the details of USB restricted mode, it's a weaker variant of what we're doing for USB attack surface reduction and is off by default so it doesn't help most users.
There was a recent upstream Linux kernel patch for one of the Linux kernel vulnerabilities being exploited. We don't know which company/government was exploiting it. It's unlikely that each of these groups is using the same USB peripheral vulnerability and they're almost certainly each aware of at least one other vulnerability they can use. There are a lot of USB peripheral drivers including ones with very low quality code.