This blurred screenshot appears to list which Pixel phones Cellebrite gadgets can hack.
Credit: rogueFed
This fuzzy screenshot appears to list which Pixel phones Cellebrite gadgets can hack.
Credit: rogueFed
A minimum of according to Cellebrite, GrapheneOS is more protected than what Google uses out of package. The business is informing police in these instructions that its innovation can draw out information from Pixel 6, 7, 8, and 9 phones in opened, AFU, and BFU states on stock software application. It can not brute-force passcodes to allow complete control of a gadget. The leaker likewise keeps in mind police is still not able to copy an eSIM from Pixel gadgets. Especially, the Pixel 10 series is moving far from physical SIM cards.
For those very same phones running GrapheneOS, authorities can anticipate to have a much more difficult time. The Cellebrite table states that Pixels with GrapheneOS are just available when running software application from before late 2022– both the Pixel 8 and Pixel 9 were released after that. Phones in both BFU and AFU states are safe from Cellebrite on upgraded builds, and since late 2024, even a totally opened GrapheneOS gadget is immune from having its information copied. An opened phone can be examined in a lot of other methods, however information extraction in this case is restricted to what the user can gain access to.
The initial leaker declares to have actually called into 2 calls up until now without detection. RogueFed likewise called out the conference organizer by name (the 2nd screenshot, which we are not reposting). Chances are that Cellebrite will be screening conference guests more thoroughly now.
We’ve connected to Google to ask about why a custom-made ROM developed by a little non-profit is more resistant to commercial phone hacking than the main Pixel OS. We’ll upgrade this post if Google has anything to state.
Learn more
As an Amazon Associate I earn from qualifying purchases.







