Oww, come on, it's a Cellebrite UFED touch 64 GB, not a nuclear reactor.<p>Not to be confused with the Cellebrite touch 32gb (as I did BTW), still it is not a "science fiction" magical device capable of doing miracles, and even if it can do miracles, these are linked to the latest software releases and a valid licence.<p>JFYI, the thingies that were put on sale were posted here:<p><a href="https://forensicfocus.com/Forums/viewtopic/t=17498/" rel="nofollow">https://forensicfocus.com/Forums/viewtopic/t=17498/</a><p><a href="https://forensicfocus.com/Forums/viewtopic/t=17497/" rel="nofollow">https://forensicfocus.com/Forums/viewtopic/t=17497/</a><p><a href="https://www.flickr.com/photos/129155109@N06/sets/72157702917466732/" rel="nofollow">https://www.flickr.com/photos/129155109@N06/sets/72157702917...</a><p>But they are by no means a "unique" case, I've seen over the years many people selling their old tools, the fact that there have not been wiped clean is another (preoccupying but comletely separate) issue.
The biggest concern here is case data left on the device. Just having a device or the software isn't enough to get into most phones. Cellebrite kits come with a huge case of various types of USB cables that do something to allow access to the target device. Any old USB-C wont work, you have to have the correct USB-C from the kit to go with the target model<p>edit: Turns out the cables are on Ebay as well for about $5 - $30
I could imagine that if it's infeasible to to break into the device to see how it's cracking the iPhone, then Apple could opt into setting up a dummy phone, then sniffing all the communications with the device to get an approximate idea for how it works.