Device analysis

← All our services

Device analysis

Examine a client device (phone, computer) under a signed written mandate, to identify signs of compromise, unauthorised surveillance or traces of digital attack. The analysis is performed exclusively on macOS, iOS and Linux equivalents. No Windows or Microsoft-based device is supported. No action is taken without the knowledge of a third party.

What this service can offer

  • Examine a client device (macOS, iOS, Linux) to detect signs of compromise, spyware, unauthorised surveillance or traces of attack.
  • Identify suspicious applications, unknown configuration profiles, automatic connections or abusive permissions.
  • Spot indicators of phishing, social engineering or attempted unauthorised access to the device.
  • Analyse accessible system logs to reconstruct suspicious events.
  • Reconstruct a timeline of suspicious actions or accesses on the device.
  • Document findings with consultable sources and a nuanced conclusion.

What the service cannot guarantee

  • Detection of every piece of malware or every form of surveillance.
  • Access to encrypted data without the keys or the owner's cooperation.
  • Analysis of Windows or Microsoft-based devices.
  • Action without a signed written mandate from the device owner.
  • Intervention without the knowledge of a third party or without clear consent.
  • Replacement of a police investigation, judicial expertise or specialised professional security intervention.

Process applied

1

Receipt and verification of the signed written mandate from the device owner.

2

Definition of context, analysis scope and investigation objectives.

3

Examination of the device (macOS, iOS or Linux) offline if necessary, in isolated mode.

4

Analysis of applications, profiles, permissions, connections and accessible system logs.

5

Reconstruction of the timeline of suspicious events.

6

Documented synthesis with cited sources and a nuanced conclusion.