Overview
- Screenshots posted by a forum user who entered a Cellebrite Microsoft Teams sales call show a support matrix detailing claimed capabilities against Google Pixel phones.
- The matrix indicates Cellebrite tools can extract data from Pixel 6, 7, 8, and 9 on stock software in unlocked, AFU, and BFU states, though they cannot brute‑force passcodes.
- For Pixels running recent GrapheneOS builds, the table shows extraction attempts failing in both BFU and AFU, with even fully unlocked devices listed as immune to data copying as of late 2024.
- The leak notes law enforcement still cannot copy a Pixel eSIM, and the slides did not cover the Pixel 10 series.
- Cellebrite declined to confirm technical details, the leaker claims to have joined at least two calls without detection, and one screenshot identified a pre‑sales employee.