-
Issue: securing iPhone 14 (iOS 17.5)
Problem: being hacked by hacker utilising suspected Mobile forensics software.
Solution proposed: software for iPhone to prevent unauthorised infiltration by mob…
-
-
Dear Dr. Zhao,
I have sent an email to your inbox requesting access to the dataset. Check whenever you get a chance. I look forward to hearing back from you. Thank you!
-
U039b updated
2 weeks ago
-
Probably relevant in an IR analysis.
This can be useful for mobile forensics, and also, it can be good to spot vulnerabilities in non-updated devices (which trust certificates that has been leaked o…
-
Mobile framework and binary (both) package need to use alternative bootstrap nodes which will have relay support enabled for the OB network. In the short-term, we would like to override the mobile fra…
-
User feedback suggest breaking down the PTS description on home into concise bullet points for better readability and highlighting key features.
# Before
> PiRogue tool suite (PTS) provides a pla…
-
Having some sort of plausible deniability built in the app would be nice, or at least some means to hide certain sensitive notes, like TokenVault or other potential loss-inducing data (credit card num…
-
Hello!
There is a problem in the'Data Processing' stage. The specific command is 'cd resources && bash download_resources_data.sh'. If executed directly, it will report an error that I have no acce…
-
### Jenkins and plugins versions report
Environment
```text
Jenkins: 2.457
OS: Linux - 5.10.215-203.850.amzn2.x86_64
Java: 17.0.11 - Eclipse Adoptium (OpenJDK 64-Bit Server VM)
---…