Event JSON
{
"id": "16fee2f95f9b9aa70ccf33cc0a724f26ad3a9af956b38a52efcfb8da26a1bd76",
"pubkey": "b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9",
"created_at": 1721402519,
"kind": 1,
"tags": [
[
"e",
"744ac058b5f5e64714ff7b533ff6d3cdb5f25bfc84e830dac53d25c055111e36",
"",
"reply"
],
[
"e",
"ea030df7417c373492391f421ac335e582a3b8b62763fd8f160cd98eb8b71335",
"",
"root"
],
[
"p",
"b3ba3c5045fbaf99be9cb4daa9f1d7baeedaba0fc5b91596511e2fb7a70dd7f9"
],
[
"p",
"aa3b4d495a4a96556fcce5ffa15183eb33a74102b3bd7254039c030980103598"
],
[
"proxy",
"https://grapheneos.social/@GrapheneOS/112813835524163941",
"web"
],
[
"proxy",
"https://grapheneos.social/users/GrapheneOS/statuses/112813835524163941",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://grapheneos.social/users/GrapheneOS/statuses/112813835524163941",
"pink.momostr"
],
[
"-"
]
],
"content": "What the documentation shows is that in April 2024, Cellebrite had working exploits for nearly all Android and iOS devices but was currently a couple months behind on supporting iOS versions.\n\nIt also showed they could not yet bypass secure element throttling on the iPhone 12 or later / Pixel 6 or later but had bypassed it on earlier versions Pixels added it with the Pixel 2 and iPhones also added it a long time ago, and that didn't hold up against them over the long term.",
"sig": "c462cc5433e6e8d886fae315a099c3469c2e3ee035f10fafa6efaf4c989c4be5592f2141b1be494c454b3f0405b99b030e4cf4053ee80425bb3742f6d0f19b55"
}