It isn't that hard to figure out how Cellebrite's hardware works

Ryan Carboni ryacko at
Fri May 4 17:20:05 PDT 2018
"And that’s what companies like Cellebrite and Grayshift do. They sell
devices that break device security—not by breaking the encryption on the
device—but by finding flaws in implementation."

Somehow Cellebrite's tools work around rate limits. This implies either the
rate limit is on the secure enclave, which can be overwritten, or the rate
limit is not enforced by the secure enclave. So obviously there must be
some mechanism that forces the creation of a rate limit.

Obviously the whole issue is a matter of more research and

Although this whole argument seems to be against certificate authorities
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 998 bytes
Desc: not available
URL: <>

More information about the cypherpunks mailing list