In case the FDE is made use of, the master crucial will likely be required to decrypt the user data. To receive it, the investigator will have to get the password and hardware-protected crucial to be able to execute code over the device with an increased privilege amount. Figure 4 https://www.gmdsoft.com/