this post was submitted on 30 Oct 2025
47 points (100.0% liked)

technology

24083 readers
387 users here now

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

founded 5 years ago
MODERATORS
 

cross-posted from: https://lemmy.ml/post/38282920

Someone recently managed to get on a Microsoft Teams call with representatives from phone hacking company Cellebrite, and then leaked a screenshot of the company’s capabilities against many Google Pixel phones, according to a forum post about the leak and 404 Media’s review of the material.

The leak follows others obtained and verified by 404 Media over the last 18 months. Those leaks impacted both Cellebrite and its competitor Grayshift, now owned by Magnet Forensics. Both companies constantly hunt for techniques to unlock phones law enforcement have physical access to.

“You can Teams meeting with them. They tell everything. Still cannot extract esim on Pixel. Ask anything,” a user called rogueFed wrote on the GrapheneOS forum on Wednesday, speaking about what they learned about Cellebrite capabilities. GrapheneOS is a security- and privacy-focused Android-based operating system.

rogueFed then posted two screenshots of the Microsoft Teams call. The first was a Cellebrite Support Matrix, which lays out whether the company’s tech can, or can’t, unlock certain phones and under what conditions. The second screenshot was of a Cellebrite employee. 💡 Do you know anything else about phone unlocking technology? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

According to another of rogueFed’s posts, the meeting took place in October. The meeting appears to have been a sales call. The employee is a “pre sales expert,” according to a profile available online.

The Support Matrix is focused on modern Google Pixel devices, including the Pixel 9 series. The screenshot does not include details on the Pixel 10, which is Google’s latest device. It discusses Cellebrite’s capabilities regarding ‘before first unlock’, or BFU, when a piece of phone unlocking tech tries to open a device before someone has typed in the phone’s passcode for the first time since being turned on. It also shows Cellebrite’s capabilities against after first unlock, or AFU, devices.
Screenshot via GrapheneOS forum.

The Support Matrix also shows Cellebrite’s capabilities against Pixel devices running GrapheneOS, with some differences between phones running that operating system and stock Android. Cellebrite does support, for example, Pixel 9 devices BFU. Meanwhile the screenshot indicates Cellebrite cannot unlock Pixel 9 devices running GrapheneOS BFU.

In a statement, Victor Cooper, senior director of corporate communications and content strategy at Cellebrite, told 404 Media “We do not disclose or publicize the specific capabilities of our technology. This practice is central to our security strategy, as revealing such details could provide potential criminals or malicious actors with an unintended advantage.” Google did not immediately respond to a request for comment.

GrapheneOS is a long running project which makes sizable security changes to an Android device. “GrapheneOS is focused on substance rather than branding and marketing. It doesn't take the typical approach of piling on a bunch of insecure features depending on the adversaries not knowing about them and regressing actual privacy/security. It's a very technical project building privacy and security into the OS rather than including assorted unhelpful frills or bundling subjective third party apps choices,” the project’s website reads.

As well as being used by the privacy and security conscious, criminals also turn to GrapheneOS. After the FBI secretly ran its own backdoored encrypted phone company for criminals, some drug traffickers and the people who sell technology to the underworld shifted to using GrapheneOS devices with Signal installed, according to interviews with phone sellers.

In their forum post, rogueFed wrote that the “meeting focused specific on GrapheneOS bypass capability.”

They added “very fresh info more coming.”

top 8 comments
sorted by: hot top controversial new old
[–] trinicorn@hexbear.net 19 points 1 week ago* (last edited 1 week ago) (1 children)

Good news for graphene. They're definitely all over it and not invulnerable but it looks like cellebrite currently can't break into up-to-date graphene devices, even with bootloader unlocked. My takeaway currently is that graphene will help you in the short term but you can't expect it to keep you safe for years after, if it's in evidence or whatever they may gain the ability to unlock it later in the future.

[–] tactical_trans_karen@hexbear.net 4 points 1 week ago (1 children)

It works just like an arms race. If you want really secure, use offline devices. Microwave your electronics if you want to destroy everything. But even better, hand written single use short cyphers.

[–] trinicorn@hexbear.net 2 points 1 week ago

offline devices don't help if they get physically seized, which I believe is cellebrite's specialty, but for things that don't need to be online, yes. as far as the practicality of hand written cipher pads and such, I feel like it should be obvious that they aren't practical in most circumstances, though still a useful back-pocket tool in a pinch at least.

I found the article "Talking to Vula" by someone involved in the development of early ANC encrypted comms interesting on this topic.

[–] stupid_asshole69@hexbear.net 13 points 1 week ago* (last edited 1 week ago) (2 children)

https://files.catbox.moe/80kwmt.jpg

Picture of the support matrix

Afu = after first unlock

Bfu = before first unlock

Bf = brute force

[–] felsiq@piefed.zip 10 points 1 week ago

Not stupid_asshole69 being smart and helpful 😂

[–] AernaLingus@hexbear.net 5 points 1 week ago* (last edited 1 week ago) (1 children)

SPL = Security Patch Level

FFS = Full Filesystem (Access)

An unlocked GrapheneOS device will still have successful extraction (obviously, it's unlocked), but they can no longer access application or operating system data the user cannot access. Full Filesystem (FFS) is the highest capability of extraction (and the target all forensic tools aim to achieve with modern devices using FBE), but you also have logical extractions which just extract data through standard operating system functionality and APIs. https://discuss.grapheneos.org/d/27698-new-cellebrite-capability-obtained-in-teams-meeting/13

[–] stupid_asshole69@hexbear.net 6 points 1 week ago

Yes and what’s important from the chart is to always keep your shit updated even if you run an old pixel phone with stock android it’s better if it’s updated!

[–] miz@hexbear.net 8 points 1 week ago

"where did you say you work again?"

"Cellebrite."

"oh.... well good luck getting laid I guess."