
I haven’t used the app particularly often but the dates in the table below, specifically relate to the days in which I was attending the teaching events I previously mentioned. The logs are stored in the following location in iOS: iOS-Backup/Documents/LogsĪs you will see from the log names below, they follow a standard naming convention and a quick look at the file names shows us some useful timeline information. We treat your Activity Log data as confidential, and the terms of our Privacy Policy ( ) apply.If sending your log to Evernote, you may want to email the file to yourself and edit out any sensitive information first.”īased on this statement alone, it’s clear to me as a bit of a log monkey that I’m going to be drawn to these. Your Note titles, tags, Notebook names and occasionally Note content also may be included. “The Activity Log contains a detailed list of the steps the Evernote application performs, as well as information about your account, your device and location information (if enabled). I won’t go into too much of the information you can acquire from the Evernote plist and database files stored by the application, but here are some of what I consider to be some more interesting findings: Application LoggingĮvernote retains a number of logs relating to application usage on iOS and these logs contain a statement about their intended purpose, which is rather handy: More recently I have been using the Evernote application on my phone to access shared teaching notebooks created by course instructors and discovered some really interesting artefacts relating to logging and locations. I’ve been using Evernote for a number of years but oddly have never really come across it during the course of an investigation. So for this piece of testing, I used some open source tools to acquire a backup of my iPhone 7 running iOS 12.1. We can’t really blame those commercial products or developers, they really are fighting a futile battle. This is an inherent issue with the app update cycle. I’ve found that commercial tools we commonly use to acquire and analyse data from mobile devices are not able to parse the majority of third party apps.

New iOS applications are always coming up in our forensic examinations.
