{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com","author_name":"Chloe Braun","author_url":"https:\/\/www.magnetforensics.com\/blog\/author\/chloebraun\/","title":"S4:E3 \/\/ Deducing the duplications: Understanding duplicated data in file systems - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Qs0vbKHbBC\"><a href=\"https:\/\/www.magnetforensics.com\/resources\/s4e3-deducing-the-duplications-understanding-duplicated-data-in-file-systems\/\">S4:E3 \/\/ Deducing the duplications: Understanding duplicated data in file systems<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/resources\/s4e3-deducing-the-duplications-understanding-duplicated-data-in-file-systems\/embed\/#?secret=Qs0vbKHbBC\" width=\"600\" height=\"338\" title=\"&#8220;S4:E3 \/\/ Deducing the duplications: Understanding duplicated data in file systems&#8221; &#8212; Magnet Forensics\" data-secret=\"Qs0vbKHbBC\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.magnetforensics.com\/wp-content\/uploads\/2026\/03\/MF_MobileUnpacked_2025_600x341_S4_E3.png","thumbnail_width":600,"thumbnail_height":341,"description":"Both iOS and Android are known to keep multiple copies of certain data, but the reason why isn't always the same. Not all copies are created equal! In this episode of Mobile Unpacked, we will explore why data gets duplicated across both iOS and Android and how those duplicates can be ignored or crucial to your investigation."}