Device analysis
Examine a client device (phone, computer) under a signed written mandate, to identify signs of compromise, unauthorised surveillance or traces of digital attack. The analysis is performed exclusively on macOS, iOS and Linux equivalents. No Windows or Microsoft-based device is supported. No action is taken without the knowledge of a third party.
What this service can offer
- Examine a client device (macOS, iOS, Linux) to detect signs of compromise, spyware, unauthorised surveillance or traces of attack.
- Identify suspicious applications, unknown configuration profiles, automatic connections or abusive permissions.
- Spot indicators of phishing, social engineering or attempted unauthorised access to the device.
- Analyse accessible system logs to reconstruct suspicious events.
- Reconstruct a timeline of suspicious actions or accesses on the device.
- Document findings with consultable sources and a nuanced conclusion.
What the service cannot guarantee
- Detection of every piece of malware or every form of surveillance.
- Access to encrypted data without the keys or the owner's cooperation.
- Analysis of Windows or Microsoft-based devices.
- Action without a signed written mandate from the device owner.
- Intervention without the knowledge of a third party or without clear consent.
- Replacement of a police investigation, judicial expertise or specialised professional security intervention.
Process applied
Receipt and verification of the signed written mandate from the device owner.
Definition of context, analysis scope and investigation objectives.
Examination of the device (macOS, iOS or Linux) offline if necessary, in isolated mode.
Analysis of applications, profiles, permissions, connections and accessible system logs.
Reconstruction of the timeline of suspicious events.
Documented synthesis with cited sources and a nuanced conclusion.