Checking Smartphones
Last updated
Last updated
Note: This section is also available in , , , and .
In this section, we will go through a few steps that are generic to all types of smartphones, please consider that they are complementary to the sections on and you can find later in this guide.
Warning: because of their security model and their caracteristics, it is challenging to do live forensic on a smartphone. We are bringing here some hints on what to check on a potentially compromised device, but this process is less reliable than the Windows or MacOS processes.