Data recovery software industry is sometimes plagued with misinformation and also with companies that push their software with false pretenses. They shamelessly pay YouTubers to lie to their viewers. Watch us expose some of these lies in a 3 part expose. Part 1: SSD and data recovery
Category: Blog
Jun 10 2020
Forensic ISP recovery on Samsung S5 NEO
We received this case from one of our partners. The phone was password locked and the screen was smashed. After attempting to gain access via USB, we have decided to use another known method called ISP (in-system programming). This way we can avoid the risk of a chip off and chip damage. Watch our master …
Jun 10 2020
Recovering data from a melted USB drive
Mar 03 2020
Recovering data from a broken encrypted Verbatim USB thumbdrive
This case was quite interesting. We received this strange broken flash drive that used an eMMC chip as its storage chip, what was more strange, is that the USB drive also contained an external controller. This type of configuration is unique, this is due to the fact that the eMMC chip already comes with an …
Mar 03 2020
Getting into a password protected iPhone
In this new video, we employ new checkm8 exploit combined with Cellebrite UFED, to gain access into a password protected iPhone and perform a BFU (Before First Unlock) extraction. And then compare the results with an iPhone for which a password is provided. While this extraction is very limited, it is at most important for …