Replies: 4 comments 22 replies
-
|
it's a very interesting way of approach you have. you stated that with luck that you can find "pref_database_unencrypted_secret" key. are there any ways to enforce this kind of key to come out on the shared prefs ? p.s. still waiting on you source code of the app that mimics keystore generation function |
Beta Was this translation helpful? Give feedback.
-
|
in your blog post, the app you've been working on could generate the database secret by duplicating the keystore file on "/data/misc/keystore/user_0/" directory. i'm having trouble finding that directory and how keystore works actually on Android 12. All that is found was a file name "persistend.sqlite". it Would be great if someone has knowledge about this Android 12 Keystore file Structure Android 11 Keystore file Structure |
Beta Was this translation helpful? Give feedback.
-
|
i'm still having issues on understanding the usage of attachment_encrypted_secret to decrypt mms messages, maybe anyone could help ? i found a hint on using the "part" table from the db but still no clues |
Beta Was this translation helpful? Give feedback.
-
|
Does this still work? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
If you have any thought on Decrypting Signal Conversation Database, feel free to leave a comment below!
Beta Was this translation helpful? Give feedback.
All reactions