• MegaUltraChicken@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    5 days ago

    Basically, the tools that LE uses to unlock devices uses exploits that require the device to be in what’s called an AFU (after first unlock) state. The data on the device is encrypted prior to that first unlock after you boot. If the device is in a BFU state (before first unlock) Cellebrite/Greykey (by far the primary tools used in this space) basically hit a wall.