09-15-2020, 10:20 AM
GrayShift’s GrayKey iPhone forensics tool disassembled in FCC photos
<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/09/grayshifts-graykey-iphone-forensics-tool-disassembled-in-fcc-photos.jpg" width="1320" height="742" title="" alt="" /></div><div><p>New images of GrayShift’s GrayKey have surfaced via an FCC filing, giving a close look at the iPhone unlocking device in use by law enforcement officials to gain access to secured iPhones. </p>
<div class="col-sm-12">
<p>The GrayKey device first gained notoriety in 2018, as a relatively inexpensive encryption bypass tool primarily intended for use by the police and <a href="https://appleinsider.com/articles/18/04/12/iphone-unlocking-graykey-hardware-in-increasing-use-across-all-levels-of-law-enforcement">law enforcement organizations</a>. It is meant to allow investigators entry to a locked iPhone, without requiring the user’s permission. </p>
</div>
<div class="col-sm-12">
<p>Relatively <a href="https://appleinsider.com/articles/18/03/15/graykey-iphone-unlocking-tool-revealed-as-pocket-sized-device-with-questionable-security">few photographs</a> of the device have been distributed, with the company and its clients attempting to maintain secrecy about it. Earlier releases revealed it to consist of a small gray square box with two cables sticking out, intended for connection to mobile devices, but not much further information stemmed forth about its design. </p>
</div>
<div class="col-sm-12">
<div class="align-center"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/09/grayshifts-graykey-iphone-forensics-tool-disassembled-in-fcc-photos.jpg" alt="The LEDs and Lightning cables at the front of the GrayKey unit" class="img-responsive article-image" loading="lazy">
</div>
<p><span class="carousel-caption">The LEDs and Lightning cables at the front of the GrayKey unit</span></p>
</div>
<div class="col-sm-12">
<p>In FCC filings first <a href="https://www.vice.com/en_us/article/v7gkpx/graykey-grayshift-photos-iphone-unlocking-tech">reported</a> by <em>Motherboard</em>, the GrayKey is shown to have remarkably few external details. On one side, there are three LEDs, with two above each of the short Lightning cables and one in the middle above the label “Status,” while on the back are ethernet and USB ports used to connect it to a computer for reading the data, and a power socket.
</p>
</div>
<div class="col-sm-12">
<p>On the base is a sticker advising of support and sales website and email addresses, and a phone number. </p>
</div>
<div class="col-sm-12">
<p>Opening up the GrayKey, the device is found to be made using an ARM processor from Compulab. A mainboard at the base is protected by a metal plate, which has a further loosely-fitted slim board attached on top to connect the Lightning cables to the rest of the circuitry. </p>
</div>
<div class="col-sm-12">
<div class="align-center"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/09/grayshifts-graykey-iphone-forensics-tool-disassembled-in-fcc-photos-1.jpg" alt="An FCC teardown of the GrayKey" class="img-responsive article-image" loading="lazy">
</div>
<p><span class="carousel-caption">An FCC teardown of the GrayKey</span></p>
</div>
<div class="col-sm-12">
<p>Some of the images for the internals has an SSD on top of the mainboard, though the design of the device suggests the drive isn’t actually part of the assembly. It seems likely that the SSD is put in place to hide the underside of the circuit board.
</p>
</div>
<div class="col-sm-12">
<p>Devices sold in the United States typically have to be submitted to the FCC to acquire an FCC ID, meaning it will comply with FCC standards and is safe for sale. Given the nature of GrayKey, it seems unusual that a security device used by law enforcement would be subjected to less than secretive treatment such as an FCC filing. </p>
</div>
<div class="col-sm-12">
<p>GrayShift has found many clients for the GrayKey, as law enforcement grapples with the issue of wanting to gain access to devices owned by suspects, but are unable to secure a passcode or to pass biometrics to do so without the suspect’s cooperation. The device has reportedly been used in some high-profile investigations, including one <a href="https://appleinsider.com/articles/20/01/16/fbi-reportedly-accessed-locked-iphone-11-pro-max-with-graykey-third-party-tool">by the FBI</a> in late 2019 where it was allegedly used to gain access to a locked <a href="https://appleinsider.com/inside/iphone-11-pro-max">iPhone 11 Pro Max</a>. </p>
</div>
<div class="col-sm-12">
<p>In March, GrayShift started to market a <a href="https://appleinsider.com/articles/20/05/18/new-grayshift-spyware-lets-police-surreptitiously-snatch-iphone-passcodes">software tool</a> that could be used to reveal an iPhone’s passcode without cracking the device. The digital forensics tool named “Hide UI” reportedly consists of spyware that can be installed via GrayKey and acts as a keylogger, one that monitors for when the user enters their passcode. </p>
</div>
</div>
https://www.sickgaming.net/blog/2020/09/...cc-photos/
<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/09/grayshifts-graykey-iphone-forensics-tool-disassembled-in-fcc-photos.jpg" width="1320" height="742" title="" alt="" /></div><div><p>New images of GrayShift’s GrayKey have surfaced via an FCC filing, giving a close look at the iPhone unlocking device in use by law enforcement officials to gain access to secured iPhones. </p>
<div class="col-sm-12">
<p>The GrayKey device first gained notoriety in 2018, as a relatively inexpensive encryption bypass tool primarily intended for use by the police and <a href="https://appleinsider.com/articles/18/04/12/iphone-unlocking-graykey-hardware-in-increasing-use-across-all-levels-of-law-enforcement">law enforcement organizations</a>. It is meant to allow investigators entry to a locked iPhone, without requiring the user’s permission. </p>
</div>
<div class="col-sm-12">
<p>Relatively <a href="https://appleinsider.com/articles/18/03/15/graykey-iphone-unlocking-tool-revealed-as-pocket-sized-device-with-questionable-security">few photographs</a> of the device have been distributed, with the company and its clients attempting to maintain secrecy about it. Earlier releases revealed it to consist of a small gray square box with two cables sticking out, intended for connection to mobile devices, but not much further information stemmed forth about its design. </p>
</div>
<div class="col-sm-12">
<div class="align-center"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/09/grayshifts-graykey-iphone-forensics-tool-disassembled-in-fcc-photos.jpg" alt="The LEDs and Lightning cables at the front of the GrayKey unit" class="img-responsive article-image" loading="lazy">
</div>
<p><span class="carousel-caption">The LEDs and Lightning cables at the front of the GrayKey unit</span></p>
</div>
<div class="col-sm-12">
<p>In FCC filings first <a href="https://www.vice.com/en_us/article/v7gkpx/graykey-grayshift-photos-iphone-unlocking-tech">reported</a> by <em>Motherboard</em>, the GrayKey is shown to have remarkably few external details. On one side, there are three LEDs, with two above each of the short Lightning cables and one in the middle above the label “Status,” while on the back are ethernet and USB ports used to connect it to a computer for reading the data, and a power socket.
</p>
</div>
<div class="col-sm-12">
<p>On the base is a sticker advising of support and sales website and email addresses, and a phone number. </p>
</div>
<div class="col-sm-12">
<p>Opening up the GrayKey, the device is found to be made using an ARM processor from Compulab. A mainboard at the base is protected by a metal plate, which has a further loosely-fitted slim board attached on top to connect the Lightning cables to the rest of the circuitry. </p>
</div>
<div class="col-sm-12">
<div class="align-center"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/09/grayshifts-graykey-iphone-forensics-tool-disassembled-in-fcc-photos-1.jpg" alt="An FCC teardown of the GrayKey" class="img-responsive article-image" loading="lazy">
</div>
<p><span class="carousel-caption">An FCC teardown of the GrayKey</span></p>
</div>
<div class="col-sm-12">
<p>Some of the images for the internals has an SSD on top of the mainboard, though the design of the device suggests the drive isn’t actually part of the assembly. It seems likely that the SSD is put in place to hide the underside of the circuit board.
</p>
</div>
<div class="col-sm-12">
<p>Devices sold in the United States typically have to be submitted to the FCC to acquire an FCC ID, meaning it will comply with FCC standards and is safe for sale. Given the nature of GrayKey, it seems unusual that a security device used by law enforcement would be subjected to less than secretive treatment such as an FCC filing. </p>
</div>
<div class="col-sm-12">
<p>GrayShift has found many clients for the GrayKey, as law enforcement grapples with the issue of wanting to gain access to devices owned by suspects, but are unable to secure a passcode or to pass biometrics to do so without the suspect’s cooperation. The device has reportedly been used in some high-profile investigations, including one <a href="https://appleinsider.com/articles/20/01/16/fbi-reportedly-accessed-locked-iphone-11-pro-max-with-graykey-third-party-tool">by the FBI</a> in late 2019 where it was allegedly used to gain access to a locked <a href="https://appleinsider.com/inside/iphone-11-pro-max">iPhone 11 Pro Max</a>. </p>
</div>
<div class="col-sm-12">
<p>In March, GrayShift started to market a <a href="https://appleinsider.com/articles/20/05/18/new-grayshift-spyware-lets-police-surreptitiously-snatch-iphone-passcodes">software tool</a> that could be used to reveal an iPhone’s passcode without cracking the device. The digital forensics tool named “Hide UI” reportedly consists of spyware that can be installed via GrayKey and acts as a keylogger, one that monitors for when the user enters their passcode. </p>
</div>
</div>
https://www.sickgaming.net/blog/2020/09/...cc-photos/