
With the extracted encryption keys, Oxygen Forensic® Detective can decrypt Briar, ProtonMail, Silent Phone, and Signal apps. To use this functionality, select the Qualcomm EDL method in the Oxygen Forensic® Device Extractor.

We’ve added the ability to extract encryption keys from the Android Keystore from devices based on the Qualcomm chipsets: MSM8917, MSM8937, MSM8940, and MSM8953. Supported models include Xiaomi Poco M2, Xiaomi Redmi 9 Global, Xiaomi Redmi 9 Prime.Īndroid Keystore extraction from Qualcomm-based devices We’ve also added the ability to decrypt images of Xiaomi and Poco devices based on the Mediatek MT6769T chipset and having File-Based Encryption (FBE).A user-friendly GUI, automatic report generation, and tools for mobile forensics, network forensics, data recovery, and other features are among the features. Moreover, our support now covers Android devices that are based on the MT6739 chipset and have TEE Kinibi and Full-Disk Encryption (FDE). A Linux Live CD called CAINE (Computer Aided INvestigative Environment) has a multitude of digital forensic capabilities on it.

Now Android devices that have TEE Trusty and File-Based Encryption (FBE) and are based on the MT6765 and MT6580 chipsets are supported for passcode brute force.

