{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com","author_name":"Sophie Hilliard","author_url":"https:\/\/www.magnetforensics.com\/blog\/author\/sophiehilliard\/","title":"S3:E10 \/\/ Picking apart the passcodes: Determining the method of unlock on devices - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"R5It1DaYJh\"><a href=\"https:\/\/www.magnetforensics.com\/resources\/s3e10-picking-apart-the-passcodes-determining-the-method-of-unlock-on-devices\/\">S3:E10 \/\/ Picking apart the passcodes: Determining the method of unlock on devices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/resources\/s3e10-picking-apart-the-passcodes-determining-the-method-of-unlock-on-devices\/embed\/#?secret=R5It1DaYJh\" width=\"600\" height=\"338\" title=\"&#8220;S3:E10 \/\/ Picking apart the passcodes: Determining the method of unlock on devices&#8221; &#8212; Magnet Forensics\" data-secret=\"R5It1DaYJh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.magnetforensics.com\/wp-content\/uploads\/2025\/10\/MF_MobileUnpacked_2025_600x341_S3_E10.png","thumbnail_width":600,"thumbnail_height":341,"description":"A common theme in digital forensics is putting the target behind the keyboard. One way to help this is around the use of passcodes and especially the use of biometrics. How can we determine though what the unlock method was? Was it because biometrics were used, or was the passcode manually entered? Where do we look to figure out when the device was unlocked and how trustworthy are these values? In this episode of Mobile Unpacked, we'll dive in deeper to these very topics!"}