O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

iOS data security

A complete description of iOS data security is out of the scope of this book, but we wish to give you just an overview (taken from the Apple paper iOS Security and from Christian D'Orazio's thesis; refer to Appendix A, References) of the hardware and software security features.

Hardware security features

Every iDevice, starting from iPhone 3GS, has a dedicated AES 256-bit crypto engine built in between the flash storage and the main system memory. The purposes of this processor are to accelerate the encryption and decryption operations and to protect user data so that it remains encrypted on the device's flash memory. A unique ID (UID) is associated with each device and allows data to be cryptographically tied to a particular device. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required