{"id":859,"date":"2016-05-31T10:12:11","date_gmt":"2016-05-31T10:12:11","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=859"},"modified":"2024-12-11T19:18:46","modified_gmt":"2024-12-11T19:18:46","slug":"extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/","title":{"rendered":"Extracting data from a damaged iPhone via chip-off technique &#8211; Part 2"},"content":{"rendered":"<p>Our last article, &#8220;Extracting data from a damaged iPhone via chip-off technique&#8221;, have received mixed reviews from our readers.<!--more--><\/p>\n<p>Some wrote, that it&#8217;s impossible:<\/p>\n<p><em>It doesn&#8217;t work.<\/em><\/p>\n<p>ZombieKiller316 of reddit.com &#8211; we don&#8217;t know who is it, but we&#8217;re sure, he&#8217;s a <a href=\"https:\/\/www.digitalforensics.com\/\">computer forensics professional<\/a>.<\/p>\n<p>Others wrote, that the data in Apple devices is encrypted (Really? They thought, we didn&#8217;t know about it?):<\/p>\n<p><em>I tried and they ALL ENCRYPTED, except iPhone 3G (very old one)<\/em><\/p>\n<p>Sasha Sheremetov, Engineer, Rusolut<\/p>\n<p><em>How was the decryption done? \u2013 Chip off is mostly done in the cases where data is otherwise inaccessible (phone locked, damaged) so the data in the chip would be encrypted and protected by secure enclave.<\/em><\/p>\n<p>Harpreet Singh Dardi, Consultant &#8211; Computer Forensics &amp; eDiscovery at PwC<\/p>\n<p><em>Short Answer is it is impossible to Chip-Off anything above 4s due to Encryption being tied to UID and several other features.<\/em><\/p>\n<p><em>There are some advanced NSA level attacks that can compromise a 4s\/5\/5c if you want to spend 500k + and hire a company to reverse engineer the silicon of the CPU decapping it with Acid\/Ion Laser and probing it. A less risky attack would be using Infrared Laser Glitching. Another possible option would be discovering a side-channel attack that compromised the AES Crypto Engine or CPU in order to reveal the UID. In short it aint happening.<\/em><\/p>\n<p>kyle_pc_terminator of reddit.com &#8211; man, thank you for this comment.<\/p>\n<p>Okay. It&#8217;s time to tell you a bit more about what we can do.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"About_impossibility_in_principle_of_data_recovery_from_damaged_Apple_devices\"><\/span>About impossibility in principle of data recovery from damaged Apple devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Some readers wrote us, that it&#8217;s impossible to extract data from any damaged iOS-device. But some iOS-devices, including\u00a0iPhone 2G, iPhone 3G, don&#8217;t use hardware encryption. So it&#8217;s possible to use the chip-off technique for data extraction &#8211; it&#8217;s confirmed by our tests. Also, <a href=\"http:\/\/www.pc-3000flash.com\/solbase\/task.php?group_id=321&amp;lang=eng\" target=\"_blank\" rel=\"noopener\">ACELab KB<\/a> (Anwer Alkandri, thanks for the link) contains info about data recovery from iPhone 3G chip.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-867\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/pc3000_iphone_chip-off.png\" alt=\"pc3000_iphone_chip-off\" width=\"975\" height=\"115\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/pc3000_iphone_chip-off.png 975w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/pc3000_iphone_chip-off-300x35.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/pc3000_iphone_chip-off-768x91.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/pc3000_iphone_chip-off-512x60.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/pc3000_iphone_chip-off-920x109.png 920w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1. Information from\u00a0ACELab KB<\/em><\/p>\n<h2><span class=\"ez-toc-section\" id=\"About_encryption_of_Apple_devices\"><\/span>About encryption of Apple devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Since the release of iPhone 3GS, Apple has built encryption into the hardware and firmware of its\u00a0products\u00a0to make user&#8217;s data even more secure. What is more, in top iOS devices some other encryption tricks are used. So, there is a number of encryption levels\u00a0in iOS devices. For more information about software and hardware encryption, as well as Secure Enclave Compressor, you can read in open sources, for example, <a href=\"https:\/\/www.apple.com\/business\/docs\/iOS_Security_Guide.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>So, if you image the partition with the user data, you&#8217;ll see the filesystem structure, but no file content &#8211; all files are encrypted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-869\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/ios_fs.jpg\" alt=\"ios_fs\" width=\"262\" height=\"321\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/ios_fs.jpg 262w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/ios_fs-245x300.jpg 245w\" sizes=\"auto, (max-width: 262px) 100vw, 262px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2. A part of userdata partition structure<\/em><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-870\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/encrypted_jpg.jpg\" alt=\"encrypted_jpg\" width=\"501\" height=\"588\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/encrypted_jpg.jpg 501w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/encrypted_jpg-256x300.jpg 256w\" sizes=\"auto, (max-width: 501px) 100vw, 501px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3. An encrypted JPG file<\/em><\/p>\n<p>What should an examiner do?<\/p>\n<p>There are two ways:<\/p>\n<ol>\n<li>Use brute force attack to decrypt data (but, as you remember, iOS-devices have a number of encryption levels).<\/li>\n<li>Find a way to get the keys.<\/li>\n<\/ol>\n<p>Both ways are impossible, aren&#8217;t they?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"About_our_chip-off_technique\"><\/span>About our chip-off technique<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>On the one hand, we can&#8217;t speak about the technique in details in order nobody can copy it, but, on the other hand, we can present it in general via this scheme:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-866\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/05\/weare4n6_iphone_chip-off_technique.png\" alt=\"weare4n6_iphone_chip-off_technique\" width=\"732\" height=\"197\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/weare4n6_iphone_chip-off_technique.png 732w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/weare4n6_iphone_chip-off_technique-300x81.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/05\/weare4n6_iphone_chip-off_technique-512x138.png 512w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4. The technique<\/em><\/p>\n<p>The problem is that we can take a damaged iPhone and extract data from it. But how to show you that our technique works? We don&#8217;t know.<\/p>\n<p>Now we want to answer our readers&#8217; questions:<\/p>\n<p>Q.: For which versions of iOS devices does your method work?<\/p>\n<p>A.: For all up-to-date devices (we haven&#8217;t tested all of them, but the principle is the same).<\/p>\n<p>Q.: What types of data can be extracted from a damaged iPhone?<\/p>\n<p>A.: Calls, phone book, SMS, MMS, chats, images, videos, etc.<\/p>\n<p>Q.: Can you recover deleted files?<\/p>\n<p>A.: No (excluding deleted SQLite DB records).<\/p>\n<p>Q.: Can you extract data from a locked iPhone?<\/p>\n<p>A.: No, we&#8217;ll need the passcode (or lockdown files).<\/p>\n<p>If the device is locked with Touch ID, we won\u2019t be able to access it.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"About_the_authors\"><\/span>About the authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noopener\">Igor Mikhaylov<\/a><\/p>\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"noopener\">Oleg Skulkin<\/a><\/p>\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n","protected":false},"excerpt":{"rendered":"Our last article, &#8220;Extracting data from a damaged iPhone via chip-off technique&#8221;, have received mixed reviews from our&hellip;","protected":false},"author":126,"featured_media":255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-859","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Extracting data from a damaged iPhone via chip-off technique - Part 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extracting data from a damaged iPhone via chip-off technique - Part 2\" \/>\n<meta property=\"og:description\" content=\"Our last article, &#8220;Extracting data from a damaged iPhone via chip-off technique&#8221;, have received mixed reviews from our&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-31T10:12:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T19:18:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Extracting data from a damaged iPhone via chip-off technique &#8211; Part 2\",\"datePublished\":\"2016-05-31T10:12:11+00:00\",\"dateModified\":\"2024-12-11T19:18:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/\"},\"wordCount\":692,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/\",\"name\":\"Extracting data from a damaged iPhone via chip-off technique - Part 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"datePublished\":\"2016-05-31T10:12:11+00:00\",\"dateModified\":\"2024-12-11T19:18:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Extracting data from a damaged iPhone via chip-off technique &#8211; Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Extracting data from a damaged iPhone via chip-off technique - Part 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Extracting data from a damaged iPhone via chip-off technique - Part 2","og_description":"Our last article, &#8220;Extracting data from a damaged iPhone via chip-off technique&#8221;, have received mixed reviews from our&hellip;","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-05-31T10:12:11+00:00","article_modified_time":"2024-12-11T19:18:46+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Extracting data from a damaged iPhone via chip-off technique &#8211; Part 2","datePublished":"2016-05-31T10:12:11+00:00","dateModified":"2024-12-11T19:18:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/"},"wordCount":692,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/","name":"Extracting data from a damaged iPhone via chip-off technique - Part 2","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","datePublished":"2016-05-31T10:12:11+00:00","dateModified":"2024-12-11T19:18:46+00:00","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/extracting-data-from-a-damaged-iphone-via-chip-off-technique-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Extracting data from a damaged iPhone via chip-off technique &#8211; Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=859"}],"version-history":[{"count":2,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/859\/revisions"}],"predecessor-version":[{"id":14450,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/859\/revisions\/14450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}