Open davx2012 opened 1 week ago
Using this tool with a phone disk dump presents several challenges:
qemu-img
, or simply replace BlockDevQcow2.open
with BlockDevFile.open
.persistent.sqlite
, and instead be stored on the weaver-compatible chip itself. Extracting this outer key would require VERY specialized tools. There is actually a demonstration in which an extra switch is soldered to the phone's board to trigger a bypass of the weaver chip, combined with a special crafted ROM.Basically, in addition to the small adjustable software deficiencies, you will also need to bypass the phone's hardware protection designed to ensure that not everything is dumpable.
Google most likely designed these hardware measures under the assumption that most people would only use short 4-digit PINs, which could easily be brute-forced with enough machines running in parallel, if one has access to a full dump.
As subject. I can't decrypt data from the phone disc dump via this tools?