The new checkm8-based acquisition feature in Belkasoft Evidence Center
sometimes gets confused with other products' features that rely on checkra1n jailbreak
to acquire full file system. We have received many questions about what is the
difference between checkm8 and checkra1n and why Belkasoft's acquisition method
based on checkm8 exploit is unique.
We have prepared a comparison that shows all major differences and benefits of
our method.
Belkasoft Evidence Center with checkm8 |
checkra1n |
Everything is automatic |
Done by user |
No need to do jailbreak |
Device has to be jailbroken (risk to brick a phone) |
No traces left |
Traces are left forever |
Works on Windows |
Works only on Linux/Mac |
Full file system is extracted and analyzed |
Full file system access |
More information
Belkasoft Evidence Center home page for checkm8 feature
Brett Shavers' review of Belkasoft support for checkm8
Webinar on iPhones acquisition with checkm8
Webinar on locked iPhones acquisition