Checkm8 Glossary
Checkm8 exploit made a big buzz recently since it opened doors to forensically sound acquisition of multiple models of iOS devices. Belkasoft have implemented checkm8-based approach in its Belkasoft Evidence Center mobile and computer forensics tool. In this article we would like to familiarize...