FAQ

The specialists answer to you

FAQ : #encryption

Feel free to contact us to ask some questions or share a comment.

Yes, the architectures are different and influence the recovery method. The iPhone systematically encrypts all data via the Secure Enclave chip. Without the PIN code or Apple ID credentials, extracting the encrypted data is impossible even in a laboratory—this is a deliberate protection by Apple.

Android smartphones offer more flexibility: encryption is enabled by default on recent devices, but the access methods (ADB, EDL mode for Qualcomm, manufacturer recovery modes) are more varied. Success depends on the manufacturer (Samsung, Huawei, Xiaomi, etc.) and the Android version.

In both cases, our technicians have the necessary professional tools (Cellebrite, MSAB, specialized hardware tools) to maximize the chances of recovery.

Yes, in a significant number of cases. The possibility of decryption without paying mainly depends on the type of ransomware and the existence of an exploitable cryptographic flaw.

Several recovery paths exist:

  • Public decryption keys — some ransomware has been decrypted by security researchers and agencies like Europol. The No More Ransom platform (nomoreransom.org) centralizes these tools for free.
  • Flaws in cryptographic implementation — some poorly programmed ransomware have vulnerabilities that allow keys to be reconstructed.
  • Shadow Copies (VSS) — if the ransomware has not deleted Windows Shadow Copies, a restoration is possible.
  • Unaffected backups — offline backups, NAS snapshots, or unsynchronized cloud storage.

Our laboratory analyzes each case individually. A diagnosis allows us to determine which ransomware family is involved and what decryption options are available.

Absolutely. We sign a Non-Disclosure Agreement (NDA) with every client. Our premises are secure, and all recovered data is encrypted. After delivery, your original media can be destroyed upon request.

The PLUS of SOS Data Recovery

  • Swiss leader of Data recovery

  • Extranet Follow-up

  • Security copy of the device

  • Secure offices

  • Data encryption on request

  • Storage in a safe

  • Monitoring of the parcels

  • Over 20 years of experience

  • Confidentiality