Apple also claims that, all the icloud data except the s and notes is stored encrypted on disk using 128 bit encryption algorithm. Use of a secureĢ token for authentication eliminates the need to store icloud password on devices. icloud uses a secure token for authentication and secures the content by encrypting it when sent over the internet. However additional icloud data storage can be purchased by paying annual fees to Apple. icloud limits the free backup storage to 5 Giga Bytes. icloud also provide services to track the lost phone, lock the device remotely and wipe the data remotely. It acts as a remote backup service and allows moving data seamlessly between different Apple devices like Mac, ipod and ipad. icloud services were introduced to provide a computer free backup solution. icloud backups the photos, application data, device settings, messages and mail, etc. icloud Backup: icloud allows backup & restoring the iphone contents over Wi-Fi/3G to a cloud with a registered Apple account. The article briefs about icloud backups and provides a deep analysis of itunes backups. ios Backups: With ios 5, data stored on the iphone can be backed up to a computer with itunes or to a cloud based storage with icloud. Below details outline their research and gives an overview on usage of backup recovery tools. Backups shown in the article are captured on Mac OS X Lion 10.6 using itunes Researchers at Sogeti Labs have released open source forensic tools (with the support of ios 5) to read normal and encrypted itunes backups. Note: iphone 4 GSM model with ios is used for the demos. Techniques explained in this article works on all Apple Devices which are running with ios 5. So gaining access to the computer s file system will also gives access to the mobile devices data. When a computer is used to sync with the iphone, most of the information on the iphone is likely to be backed up onto the computer. Understanding the forensic techniques on itunes backups is also useful in cases where we get physical access to the suspect s computer instead of the iphone directly. This article explains the technical procedure and challenges involved in extracting data and artefacts from the iphone backups. itunes uses AFC (Apple file connection) protocol to take the backup and the backup process does not modify anything on the iphone except the escrow key records. In critical investigations, forensic examiners rely on analyzing the iphone logical backups acquired through itunes. Forensic analysis on live device reboots the phone, may alter the information stored on the device. ![]() ![]() My last article on iphone forensics detailed the forensic techniques and the technical challenges involved in performing live device forensics. ![]() iphone forensics can be performed on the backups made by itunes or directly on the live device. 1 Forensic analysis of iphone backups The goal of iphone Backup Forensics analysis is extracting data and artefacts from the itunes backups without altering any information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |