Cellebrite's CAIS now supports lawful unlocking and evidence extraction of iPhone 4S/5/5C/5S/6/6+ devices (via our in-house service only).— Shahar Tal (@jifa) February 22, 2017
At the same time this week, Cellebrite announced the next generation of its "Content Transfer" tool, which will allow retailers and operators to fully duplicate a customer's existing iPhone onto a brand new iPhone at an average content transfer speed of 1GB per minute. The developer said this should reduce wait times in stores while also pleasing anxious customers worried about losing data when upgrading to a new iPhone generation.
Cellebrite said the most important settings get transferred in the process, including wallpaper, alarm settings, weather, photos, videos, contacts, and apps. Not included are account passwords, Wi-Fi settings, health data, and website history. The company plans to hold a demonstration of the Full Transfer service for iPhones at Mobile World Congress in Barcelona, which runs next week from February 27 – March 2.
“With content transfer speeds averaging 1 GB per minute, this new service is a complete game changer.” said Yehuda Holtzman, CEO of Cellebrite Mobile Lifecycle. “With Full Transfer, the average iPhone customer with 10GB of personal data can walk out of the store with a mirror-image of their old iPhone in just 10 minutes, offering customer experience that’s far superior to anything else available today.”Although the developer has been most recognizably in the public eye for its relation to the Apple-FBI drama and its smartphone-cracking expertise, Cellebrite also offers a collection of services for retailers and businesses. Cellebrite Touch2 and Cellebrite Desktop power in-store smartphones and desktop computers, respectively, with software that the company claims offers flexibility by operating through a store's existing IT infrastructure to "deliver a fast, consistent service."
Earlier in February, Cellebrite found itself at the hands of a hacker when someone stole and publicly released a cache of Cellebrite's most sensitive data, including tools it uses to get into older iPhones. The hacker shared the data on Pastebin, intending to highlight the importance of the inevitability that any brute force tools aimed at bypassing encryption software "will make it out" into the public -- a prime fear of Apple CEO Tim Cook when the FBI originally demanded the company create a backdoor into the San Bernardino shooter's iPhone 5c last year.