{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com","author_name":"Phil Froklage","author_url":"https:\/\/www.magnetforensics.com\/blog\/author\/phil-froklage\/","title":"S1:E8 \/\/ Figuring out file explorers - part 2 - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"CZPXsntODm\"><a href=\"https:\/\/www.magnetforensics.com\/resources\/mobile-unpacked-ep-8-figuring-out-file-explorers-part-2\/\">S1:E8 \/\/ Figuring out file explorers &#8211; part 2<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/resources\/mobile-unpacked-ep-8-figuring-out-file-explorers-part-2\/embed\/#?secret=CZPXsntODm\" width=\"600\" height=\"338\" title=\"&#8220;S1:E8 \/\/ Figuring out file explorers &#8211; part 2&#8221; &#8212; Magnet Forensics\" data-secret=\"CZPXsntODm\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.magnetforensics.com\/wp-content\/uploads\/2023\/07\/MF_ResourceCentre_MobileUnpacked_July_488x488_PT2.png","thumbnail_width":488,"thumbnail_height":488,"description":"In Part 1 of this two-part Mobile Unpacked series, we explored the storage structures of the most popular file browser\/storage applications in iOS and Android. In this part, we\u2019ll dive deeper using these applications as our starting point to figure out how files got to where they ended up. This presentation will discuss file movement, &hellip; Continued"}