That only works if the phone doesnt have disk encryption turned on since at the low level recovery tools work at an encrypted disk basically looks like gibberish; and since most phones nowdays have that option enabled by factory; i don’t think it will give any results
From what i understood on graphene there is file based encryption instead of block based (whole partition is encrypted) to allow each user profile to have different keys; this is how it’s written on the site
(If i misunderstood what you where trying to tell me; i’m sorry, english isn’t my first language and i wasnt able to understand if you meant to say it as a specification or as a “oh, you use graphene as well”)
Can you mount the internal storage to a Linux machine, dd it to a .img file and try the usual data recovery tricks?
https://andreafortuna.org/2018/12/03/android-forensics-imaging-android-file-system-using-adb-and-dd/
EDIT: Apparently, you don’t need dd. adb pull can do it.
adb pull /dev/block/mmcblk0 mmcblk0.img
That only works if the phone doesnt have disk encryption turned on since at the low level recovery tools work at an encrypted disk basically looks like gibberish; and since most phones nowdays have that option enabled by factory; i don’t think it will give any results
i use graphene too
From what i understood on graphene there is file based encryption instead of block based (whole partition is encrypted) to allow each user profile to have different keys; this is how it’s written on the site
(If i misunderstood what you where trying to tell me; i’m sorry, english isn’t my first language and i wasnt able to understand if you meant to say it as a specification or as a “oh, you use graphene as well”)