Skip to main content

Data Recovery Methods - Chip-Off and JTAG


There are two main techniques when dealing with mobile phone data recovery and flash recoveries. By interrogating the NAND memory chip, both of these techniques give data recovery engineers access to a low-level image of the data, although they are both very different. Mobile phones, flash storage and solid-state-drives all rely on memory chips for storing information in contrast to hard disk drives, which use rotating platters and read/write heads.

When it comes to hard disk drives they all tend to use a common approach to storing data, meaning that data recovery tools can be generic. Flash devices on the other hand vary a lot more having a wealth of different data formats, file structures, algorithms, memory types and configurations, data extractors are often 'device specific'. This means that the only way to gain a bit for bit copy of the raw data is to interrogate the memory chips directly, effectively bypassing the operating system. This is where chip-off and JTAG technology comes into play.

The first method is the chip-off approach. This technique requires de-soldering the memory chip from the circuitry. In order to remove the chip from the device without causing any damage it requires precision skill under a microscope as making any tiny mistakes risks losing all the data permanently. After the chip is removed it can be read with data extractors. NAND chips are usually much easier to read than other types of chip and are normally what SD cards and iPhones use. This is due to the memory architecture and pin configuration being standardised. The pins are on the outside meaning there is no need to rebuild the connectors. Other common types of chip such as the BGA have multiple connectors on the underside which are directly soldered to the motherboard with thousands of different configurations so are much more difficult to remove.

The second method is JTAG which doesn't require removal of the chip. A data recovery engineer can sometimes access the memory through the JTAG ports. This is a much more lengthy process and does not damage the media. This means it can be kept in a working state which is sometimes a critical requirement in forensic investigations. A downside of this method is that it is not always as successful and can be a riskier option.

Both methods will produce a low-level image which is then 'decoded' and the user's data can be rebuilt. Both chip-off and JTAG technology is growing and becoming much more reliable meaning that the success rates of data recovery from mobile phones is almost as good as that of hard disk drives.

Comments

Popular posts from this blog

Bankruptcy and Child Support

Regardless of how tight cash gets, dealing with your kids is consistently a top need. In the event that you've wound up in more obligation than you can deal with and are in charge of youngster support too, you may ponder what seeking financial protection will mean for your circumstance. Will the help installments be incorporated into the insolvency? Or then again will they be decreased? I can enable you to stroll through these significant inquiries. One thing to know about is that tyke backing can't be released through a liquidation. Section 7 While documenting any section of chapter 11 will start the programmed remain and you would then be able to quit making installments on uncollateralized debts, you will in any case need to keep awake to date on your installments (just as verified obligation installments, on the off chance that you need to keep your property.) Bankruptcy of any sort won't stop your kid backing, and it will likewise not influence any court procedures to ...

The Ever-Present Need for Java Application Development Services

In spite of the fact that it is a typical misguided judgment in the realm of programming that the Java programming dialect will be short-lived.It isn't the situation in reality. Most trust that with the rising notoriety of programming dialects, for example, Ruby and Python, Java can never again fill the void that it once did. The proceeded with dependence on, and utilization of Java, as the main decision programming dialect for the making of money related applications demonstrates something else. The substantial reliance on Java by best association in the managing an account and monetary area can be ascribed to its security and unwavering quality. Notwithstanding those in the managing an account and money related segment, various best players in the online business industry, (for example, eBay and Amazon) additionally rely upon the Java programming dialect for the smooth working of their site back-end forms. Nature Of Mobile Application Development All things considered, the region...

How to Get a Small Business Loan Guide: What Are Your Options and How Can You Prepare?

In the US, there are an assortment of loan specialists (customary and elective) who offer some kind of independent company subsidizing. In the event that you are attempting to get cash for your start up or independent venture, it's critical to acquaint yourself with the various kinds of banks. As you figure out how to get an independent venture advance, you should start the procedure ASAP. It will require some investment - particularly in the event that you have practically zero credit, or even terrible credit. What are your choices? Here is a rundown of loan specialists and associations who have some kind of financing alternatives accessible for independent companies: • Large business banks • Direct online loan specialists • Peer-to-peer destinations (like Crowd Funding) • Local people group banks • Bank loan specialists upheld by SBA ensures • SBA • "Heavenly attendant financial specialists" There are likewise private company credit extensions, gear advances, and workin...