In the afu columns they specify that their tool can get full file system access. But in the bfu columns they only specify if they can or cannot access bfu. They can’t access the full contents of the phone as in that case those would also read ffs: yes. So that means there’s a hack they can do on bfu that doesn’t allow access to the file system but is still useful enough to advertise.
Ah, good catch. In the BFU state the device is fully encrypted, so maybe that indicates that they can’t access encrypted data inside the device without brute forcing the decryption key (which may not be possible). In comparison, AFU should have lower barriers to data access.
(This is why GrapheneOS has a setting that lets you auto reboot after a set amount of time without unlocking the device.)
I wasn’t asking about the acronyms…
In the afu columns they specify that their tool can get full file system access. But in the bfu columns they only specify if they can or cannot access bfu. They can’t access the full contents of the phone as in that case those would also read ffs: yes. So that means there’s a hack they can do on bfu that doesn’t allow access to the file system but is still useful enough to advertise.
Ah, good catch. In the BFU state the device is fully encrypted, so maybe that indicates that they can’t access encrypted data inside the device without brute forcing the decryption key (which may not be possible). In comparison, AFU should have lower barriers to data access.
(This is why GrapheneOS has a setting that lets you auto reboot after a set amount of time without unlocking the device.)