Overview
- An attendee using the handle rogueFed accessed an October Microsoft Teams sales call with a Cellebrite pre‑sales representative and posted screenshots to the GrapheneOS forum.
- The leaked Cellebrite Support Matrix reviewed by 404 Media outlines claimed capabilities by device state, distinguishing before‑first‑unlock (BFU) from after‑first‑unlock (AFU) access.
- The material suggests Cellebrite tools support data extraction from Pixel 6–9 on stock Android in both BFU and AFU, while lacking the ability to brute‑force passcodes for full device control.
- For Pixels running GrapheneOS, the table indicates far more limited access, describing updated builds as resistant in BFU and AFU and noting even unlocked devices were listed as protected as of late 2024.
- The screenshot omits the Pixel 10, the leaker says eSIM data still cannot be copied from Pixels, Google did not comment, and a Cellebrite spokesperson declined to discuss specific capabilities.
