👉 YouTube Membership:
https://www.youtube.com/channel/UC17VZx3ERdQsNvAvXQYjKKw/join
🔍 In this video, I show you how to create an encrypted iPhone backup on Linux using the libimobiledevice tools, decrypt it safely, and scan it with the Mobile Verification Toolkit (MVT) to check for signs of compromise or unusual activity.
This full walkthrough covers every step:
• Backing up your iPhone with idevicebackup2
• Ensuring the backup is fully encrypted
• Decrypting the backup for analysis
• Running MVT to scan files, logs, and artifacts
• Reviewing the results and understanding what they mean
Whether you’re privacy-conscious, curious about digital forensics, or just want to audit your own iPhone using only free and open-source tools, this guide has everything you need.
🌐 Android Forensics Github
▸
https://github.com/DouglasFreshHabian/AndroidForensics
🎶 Music Credits
🔹 Fresh Forensics
🕘 Timestamps:
00:00 – Intro: Why backup your iPhone on Linux?
01:00 – What is Mobile Verification Toolkit?
03:30 – Disclaimer
03:40 – Installing Dependencies on Linux
04:35 – Install MVT into Python Virtual Environment
08:15 – Running MVT Help Menu
08:36 – idevicebackup2
10:00 – Pair iPhone with Linux Machine
11:44 – Enable Backup Encryption
12:30 – Perform Backup using idevicebackup2
19:00 – Examining iPhone Backup Directory
20:25 – Download Indicators of Compromise
22:25 – Decrypt the Backup
27:00 – Check Backup with mvt-ios
30:34 – Reviewing The Results
32:52 – Safari Browser History
34:33 – Summary
⚠️ Disclaimer
This video is for educational and personal security purposes only. The tools demonstrated analyze your own data and should not be used on devices you do not own or have permission to inspect.