{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com","author_name":"Alyssa Robson","author_url":"https:\/\/www.magnetforensics.com\/blog\/author\/alyssa-robson\/","title":"S2:E3 \/\/ Considering the keys \u2013 exploring the keychain and keystore for what value they hold - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"QerRCPncpN\"><a href=\"https:\/\/www.magnetforensics.com\/resources\/ep-15-considering-the-keys-exploring-the-keychain-and-keystore-for-what-value-they-hold\/\">S2:E3 \/\/ Considering the keys \u2013 exploring the keychain and keystore for what value they hold<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/resources\/ep-15-considering-the-keys-exploring-the-keychain-and-keystore-for-what-value-they-hold\/embed\/#?secret=QerRCPncpN\" width=\"600\" height=\"338\" title=\"&#8220;S2:E3 \/\/ Considering the keys \u2013 exploring the keychain and keystore for what value they hold&#8221; &#8212; Magnet Forensics\" data-secret=\"QerRCPncpN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.magnetforensics.com\/wp-content\/uploads\/2023\/12\/MF_RC_Webinar_MobileUnpacked_Ep15_488x488.png","thumbnail_width":488,"thumbnail_height":488,"description":"As the security of our mobile devices grow, so does our trust in their secured storage. More and more individuals are turning to iOS and Android\u2019s key storage systems as a passcode manager, token holder, and even MFA generation tool in some cases. This next episode of\u00a0Mobile Unpacked will explore the Keychain in iOS and the Keystore in Android and discuss their security settings, what data they hold, and how to use these powerful values to unlock even deeper protections in our forensic investigations."}