Signal Says Cellebrite Mobile Device Analysis Products Can B

Signal Says Cellebrite Mobile Device Analysis Products Can Be Hacked


By Ionut Arghire on April 22, 2021
Cellebrite’s forensic applications do not include the type of security protections one would expect from a parsing software, which renders them susceptible to attacks, according to privacy-focused messaging service Signal.
The Israel-based mobile forensics company offers data extraction and analysis services to intelligence organizations and public safety entities, but also to military and enterprise sectors. Cellebrite claims to have thousands of customers in over 140 countries. It has reportedly helped the FBI access information on locked phones, including in high-profile cases, but it has also been accused of providing its services to authoritarian regimes.
The company’s software solutions, Universal Forensic Extraction Device (UFED) and Physical Analyzer, work by parsing data from devices. With that data generated by the applications running on the device, Cellebrite’s software is not in control of the data, thus prone to attacks.

Related Keywords

Moxie Marlinspike , , Universal Forensic Extraction Device , Physical Analyzer , Cellebrite , Signal , Parsing Software , Untrusted Data , Security Protections , Code Execution , உலகளாவிய தடயவியல் பிரித்தெடுத்தல் சாதனம் , உடல் பகுப்பாய்வி , செல்ல்பிரைட் , சமிக்ஞை , குறியீடு மரணதண்டனை ,

© 2025 Vimarsana