Quantcast
Channel: Forensic Focus Forums - Recent Topics
Viewing all articles
Browse latest Browse all 20112

Mobile Phone Forensics: .rem Blackberry files

$
0
0
Self-ping. Since BlackBerry uses the AES, and the device password is instrumental in encrypting the data, I would think decrypting/decoding the data would have to be done by brute force method, and the degree of difficulty would be directly proportional to the length of the password used to encrypt the data.

Viewing all articles
Browse latest Browse all 20112

Trending Articles