Quote:
Originally Posted by Fridolf
Thank you very much for your replies!
If I understand this correctly /mnt/us is just the mount point for /dev/mmcblk0p4? If this is so, what more interesting data can be be found by jailbreaking the device and copying all the partitions compared to just looking at the USB storage on a non-jailbroken device?
I should probably explain what I'm trying to do here. I'm trying to find out what information and how it can be extracted when doing a forensic analysis of the Kindle. My hope was to find where things such as firmware version, registered owner, mail address, notes and highlights, browser history and favorites etc are stored. Also trying to find out if it's possible to find these things after they have been deleted.
So far I've found the vocabulary database, the browser history,bookmarks and firmware version. All of this on /dev/mmcblk0p4. Are all of the other information stored outside of the partitioned area of mmcblk0 so it's dead end?
|
Well, this has been done (and discussed here) several times before.
I hope you aren't required to have a unique school project.
*) Un-register the device before selling it, your safe.
*) If you failed to un-register the device before having it stolen (

) . . . .
Contact Amazon, they will blacklist it in there data base - which prohibits it from being used to you / your account's disadvantage.
*) If you are one of the people who just can not avoid the challenge of "what does this do? / does it work?" when looking at the "erase all" button (

) . . . .
There is a storage area on the eMMC, **prior to** the start of the partition table (look up a bit on how backing stores in Linux are organized) that has device and owner specific information not stored elsewhere -
Your going to need a copy of that after pressing
auto-brick erase all button.