User privacy and security is one of Apple’s priorities. The company from Cupertino carries these two premises as a flag and is responsible for demonstrating it in each of the keynotes with presentations of new devices and software updates. There are companies, such as Cellebrite, that are responsible for violating the security of devices and operating systems to access this digital content without permission from Apple and the user. A new leaked document from the well-known company Cellebrite shows that They do not yet have sufficient technology for their UFED (Universal Forensic Extraction Device) system to access information from iOS 17.4. We’ll tell you all about it below.

Cellebrite still can’t access iOS 17.4 with its UFED tool

The Israeli company Cellebrite has at its disposal analysis tools and services and digital forensic data extraction. That is, it is responsible for recovering information from mobile devices with an important use in the sphere of criminal investigation, security and law enforcement. One of its most used services is UFED, capable of accessing and extracting data from mobile devices.

In addition, Cellebrite has developed methods, including UFED, capable of accessing and extracting data from iOS even when the iPhone or iPad is locked with passwords or encryption. In fact, one of the most important cases was that of San Bernardino (United States) in 2016 where the FBI had to resort to external companies, believed to be Cellebrite, to access the data of an attacker’s iPhone that Apple itself refused to provide. Little by little, Apple improves its operating systems by closing all the vulnerabilities that companies like Cellebrite use for their products.

Latest Leaked document from Cellebrite shows that at the moment there is no tool from the company that is capable of accessing the information of iOS 17.4. This means that Apple has substantially improved the security of its latest updates at the software level but also at the hardware level, which provides an additional layer of security to the user.