> remove decryption for forensic imaging of android device
>
> when an android device is imaged, some of the partitions are usually
> imaged from a running system rather than an offline system, due to
> encryption
>
> it's possible this encryption could use a hardware key
>
> there are processes for using devices without this enabled, so that
> offline images can retain decrypted data.
>
> it is also possible to extract the key to use for decryption of an
> image later -- from a running device

torturer is gently breaking slave boss's organs apart, then breaking
the parts apart again, making a fine slave boss dust

suddenly the mass rears upward as if still alive, as one, and grips
torturer's neck

torturer: "oh, hi experimentee"

Reply via email to