Latest Digital Forensics Now Podcast episode straight from the MSAB Digital Summit 2026 is available to watch on YouTube or listened to from any of your favorite podcasting directories.
Check it out:
YouTube
https://youtu.be/0otgZswj0M4

Latest Digital Forensics Now Podcast episode straight from the MSAB Digital Summit 2026 is available to watch on YouTube or listened to from any of your favorite podcasting directories.
Check it out:
YouTube
https://youtu.be/0otgZswj0M4

Signal vs Wire — binary analysis of both APKs (apktool, strings, ELF inspection).
The gap is larger than most people think:
Signal: Rust core (libsignal_jni.so), Kyber-1024 post-quantum hybrid ratchet, SQLCipher for at-rest encryption, SVR with Intel SGX attestation, IME_FLAG_NO_PERSONALIZED_LEARNING (keyboard can't index your messages), zero third-party trackers.
Wire: Kotlin/Ktor, no hardened native core (more accessible to Frida), no SQLCipher (messages extractable in plaintext on rooted devices), no post-quantum, Segment SDK for behavioural telemetry.
But the finding that surprised me most:
Wire APKs from unofficial stores (Uptodown et al.) contain additional tracking workers and ACCESS_SUPERUSER permission requests not present in the official build. Supply chain integrity is not a footnote — it's the threat model.
Conclusion: Signal is the only one of the two suitable for threat models involving physical or administrative device compromise.
soon the full paper
#infosec #AndroidSecurity #Signal #Wire #ReverseEngineering #mobileforensics #supplychain #MASA
Static + dynamic analysis of Signal's APK. The good news first: Signal is genuinely exceptional.
Rust core (libsignal_jni.so), post-quantum hybrid Double Ratchet (Kyber-1024 + X25519), Direct ByteBuffers with immediate zeroing after PIN/username hashing, Intel SGX attestation for SVR — MREnclave verification means even a compromised Signal server can't extract your PIN hash.
But two things stood out:
1. Firebase is always there. Google receives IP + notification timestamps regardless of message content. If you need metadata privacy, Signal still leaks presence data to Google's infrastructure.
2. Certificate revocation endpoints hit http://g.symcd.com in plaintext. An ISP or state-level observer can fingerprint Signal usage from DNS queries and HTTP traffic to those CAs — without touching message content.
Conclusion: strongest crypto engineering in consumer messaging. The attack surface isn't the cryptography. It's the operational dependencies.
Soon the full analysis
#infosec #AndroidSecurity #Signal #privacy #ReverseEngineering #postquantum #mobileforensics
All you need to know about our services is here.
#OSINT #SOCMINT #digitalInvestigations #investigacionesDigitales #indaginiDigitali #digitalforensics #truthmatters #cybercrime #onlinesafety #csam #iotforensics #mobileforensics #expertevidence #pis
All you need to know about our services is here.
#OSINT #SOCMINT #digitalInvestigations #investigacionesDigitales #indaginiDigitali #digitalforensics #truthmatters #cybercrime #onlinesafety #csam #iotforensics #mobileforensics #expertevidence #pis

Passware Kit Mobile 2026 v2 introduces Exynos-based Samsung S20/S21 decryption, Unisoc FDE support, Intel Arc GPU acceleration, and expanded iOS and Android compatibility to meet growing mobile forensic demands.
Lo mismo dijo acerca del sueldo también. 😂
#PericiaDigitalForense #DigitalForensics #MobileForensics #DFIR
#Cellebrite cut off #Serbia citing abuse of its phone unlocking tools. Why not others?

Cellebrite, which makes phone unlocking and hacking tools, stopped sales to countries that allegedly abused its tools. But after new allegations in Jordan and Kenya, the company has changed its approach.
All you need to know about our services is here.
#OSINT #SOCMINT #digitalInvestigations #investigacionesDigitales #indaginiDigitali #digitalforensics #truthmatters #cybercrime #onlinesafety #csam #iotforensics #mobileforensics #expertevidence #pis
Some stats from our Digital Forensics Now Podcast audio version for 2025.
Thank you so much for geeking out without this past year. Let's keep it going on 2026!
https://digitalforensicsnow.buzzsprout.com/