Court documents from a recent gun-trafficking case in New York has revealed a tool by the FBI which can read your encrypted private messages on the Signal messenger application.
- MAJOR PEER REVIEWED STUDY: Moderna Vaccine Increases Myocarditis Risk By 44 Times In Young Adults
- MUST READ: High Level International Bankers Simulate The Collapse Of Global Financial System
- BIG STORY: Wuhan Lab Isolated Monkeypox Strain In 2020
- EXPLOSIVE: Ukraine Biolabs Used Fever Carrying Mosquitoes To Spark Dengue Pandemic In Cuba
The court documents, filed by the Justice Department and obtained by Forbes, showed screenshots of Signal messages between men allegedly discussing an illegal weapons trade and attempted murder.
The screenshots reportedly showed metadata indicating that Signal had been decrypted on their phone when the device was in a certain state called “partial AFU,” which stands for “after first unlock.”
In this state, iPhones are more vulnerable to having their data extracted.
For law enforcement to access private Signal messages from an iPhone, it usually must be in AFU mode.
Subscribe to GreatGameIndia
Still, a phone’s vulnerability will depend heavily on how up to date it is.
Still, it remains unclear what tools the FBI would use to bypass encryption. Two of the most prominent iPhone forensics tools used by the agency are GrayKey and Cellebrite.
Vladimir Katalov, founder of the Russian forensics company ElcomSoft, told Forbes he believes GrayKey was the tool that the FBI used in the gun-trafficking case.
“It uses some very advanced approach using hardware vulnerabilities,” Katalov said.