用Apple就俾個false sense of security俾自己,iOS無數exploits無俾人用嚟jailbreak就無人知無人理。
啲嘢全部都要proprietary結果連security enclave都俾人crack埋。所有關於security嘅嘢都應該要係open standard,圍內自己諗出嚟只會塞死個腦。
It features an iPhone dedicated exclusively to security research, with unique code execution and containment policies.
CAS Currently Supports:
Apple iOS full file system extraction
iPhone 6S to iPhone X After-First-Unlock (AFU) extraction without needing to brute force passcode (must keep device alive after seizure!)
File-Based Encrypted (FBE) Android full file system extraction (Samsung / Huawei / Google Pixel / LG / Motorola, etc.)
• Samsung Galaxy S10, Note 10, and all A Series (2019) brute force passcode
• Huawei P30, P20, Mate 20 and many others (2017 and newer) brute force passcode
• Qualcomm and MediaTek based devices brute force passcode
• After-First-Unlock (AFU) extraction (must keep device alive seizure!), including Google Pixel 2/3/4