A recent leak reveals detailed insights into the capabilities of Graykey, a forensic tool widely utilized by law enforcement to unlock smartphones. According to documents acquired by 404 Media, Graykey can only partially access data on Apple's latest iPhone models running iOS 18 or iOS 18.0.1. The documents do not address the tool’s capabilities regarding iOS 18.1, released on October 28.
Tool Developer
Graykey is developed by the secretive company Grayshift, now part of Magnet Forensics. - **Current Situation with iOS**: The leaked data shows that Graykey achieves only partial data retrieval on iPhones 12 through 16 running iOS 18.0 and 18.0.1. Details on iOS 18.1 are not included in the leak.
Scope on Different Platforms
When it comes to Android devices, Graykey faces varied effectiveness due to differences in devices. For instance, it extracts partial data from the latest Google Pixel models only in an After First Unlock (AFU) state.
Competitor Dynamics
Cellebrite, a rival of Grayshift, has faced similar leaks in the past, highlighting ongoing competition in the forensic tool industry.
Implications of the Leak
The leak springs from a broader conflict between forensic technology developers, like Grayshift and Magnet, and smartphone manufacturers, such as Apple and Google. Despite Graykey’s partial capabilities, law enforcement often uses these tools as part of criminal investigations. Andrew Garrett, CEO of Garrett Discovery, confirmed that the leaked capabilities align with Graykey’s known functionality in the field. However, Magnet Forensics, Apple, and Google have declined to provide comments regarding the leaked documents.
Historical Context and Current Developments
The existence of Graykey first came to light in 2018, causing significant disruption in the tech and law enforcement communities due to Apple's strong stance on cybersecurity, notably highlighted by their resistance in the San Bernardino case. The innovation of USB Restricted Mode was a direct response to security concerns raised at that time. Interestingly, forensic firms have since navigated around such barriers, finding new exploits. Nonetheless, ongoing software updates by Apple and Google continue to raise the stakes in this ever-evolving cybersecurity battle.
This situation underscores the perpetual tug-of-war between forensic technology and mobile security advancements. As manufacturers implement stronger encryption measures, forensic companies strive to catch up, reflecting a dynamic landscape in digital forensics and cybersecurity.