Which method is used to implement steganography through pictures?
What is one purpose of steganography?
A forensic investigator is acquiring evidence from an iPhone.
What should the investigator ensure before the iPhone is connected to the computer?
Which file system is supported by Mac?