<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Magnet Forensics</provider_name><provider_url>https://www.magnetforensics.com</provider_url><author_name>Alyssa Robson</author_name><author_url>https://www.magnetforensics.com/blog/author/alyssa-robson/</author_url><title>S2:E3 // Considering the keys &#x2013; exploring the keychain and keystore for what value they hold - Magnet Forensics</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="S4D58e2yvG"&gt;&lt;a href="https://www.magnetforensics.com/resources/ep-15-considering-the-keys-exploring-the-keychain-and-keystore-for-what-value-they-hold/"&gt;S2:E3 // Considering the keys &#x2013; exploring the keychain and keystore for what value they hold&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.magnetforensics.com/resources/ep-15-considering-the-keys-exploring-the-keychain-and-keystore-for-what-value-they-hold/embed/#?secret=S4D58e2yvG" width="600" height="338" title="&#x201C;S2:E3 // Considering the keys &#x2013; exploring the keychain and keystore for what value they hold&#x201D; &#x2014; Magnet Forensics" data-secret="S4D58e2yvG" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.magnetforensics.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.magnetforensics.com/wp-content/uploads/2023/12/MF_RC_Webinar_MobileUnpacked_Ep15_488x488.png</thumbnail_url><thumbnail_width>488</thumbnail_width><thumbnail_height>488</thumbnail_height><description>As the security of our mobile devices grow, so does our trust in their secured storage. More and more individuals are turning to iOS and Android&#x2019;s key storage systems as a passcode manager, token holder, and even MFA generation tool in some cases. This next episode of&#xA0;Mobile Unpacked will explore the Keychain in iOS and the Keystore in Android and discuss their security settings, what data they hold, and how to use these powerful values to unlock even deeper protections in our forensic investigations.</description></oembed>
