This is a very good story for security:
signal.org
Basically, Moxie went out for a walk one day, saw a package fell off the back of a truck. That package was clearly marked Cellebrite and contained the latest software/physical hacking tools of Cellebrite.
Moxie then reverse-engineered Cellebrite’s hacking software and found their software riddled with LOTS of security holes. Basically, if Cellebrite’s software is used to try to hack a bobby-trapped device, the Cellebirite software itself will get counter-hacked. Moxie released a proof-of-concept code to do that!
If the Cellebrite software itself is counter-hacked, then all the forensic evidence it collected (both previously and presently) can be altered by the counter-malware. That means that in the context of law-enforcement, the collected ‘evidences’ produced by Cellebrite can be unreliable and thus, ought to be inadmissible in court.
And there’s a kicker. Moxie found that Cellebrite‘s software included copyrighted code from Apple. Given that Apple is so zealous about their intellectual property, and they have an interest in disrupting Cellebrite’s business model, we can easily foresee that Apple’s lawyers will soon go after Cellebrite like sharks going after blood.
Time for
!

Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective
Cellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included authoritarian regimes in Belarus, Russi...

Basically, Moxie went out for a walk one day, saw a package fell off the back of a truck. That package was clearly marked Cellebrite and contained the latest software/physical hacking tools of Cellebrite.
Moxie then reverse-engineered Cellebrite’s hacking software and found their software riddled with LOTS of security holes. Basically, if Cellebrite’s software is used to try to hack a bobby-trapped device, the Cellebirite software itself will get counter-hacked. Moxie released a proof-of-concept code to do that!
If the Cellebrite software itself is counter-hacked, then all the forensic evidence it collected (both previously and presently) can be altered by the counter-malware. That means that in the context of law-enforcement, the collected ‘evidences’ produced by Cellebrite can be unreliable and thus, ought to be inadmissible in court.
And there’s a kicker. Moxie found that Cellebrite‘s software included copyrighted code from Apple. Given that Apple is so zealous about their intellectual property, and they have an interest in disrupting Cellebrite’s business model, we can easily foresee that Apple’s lawyers will soon go after Cellebrite like sharks going after blood.
Time for
