GETTR is a social media platform founded by Jason Miller, a former
advisor to Donald J. Trump. Launched in 2021, it was created as an
alternative to mainstream platforms like Twitter, emphasizing free
speech and minimal content moderation. GETTR aims to provide a space for
open discussion, particularly catering to users who feel censored or
restricted by traditional social media sites. The platform promotes
itself as a hub for political discourse, news sharing, and unrestricted
expression.
The digital forensics value of iOS Gettr lies in its potential to
provide critical evidence related to user activity, communications, and
content shared on the platform. As a social media app emphasizing free
speech, it may contain data relevant to investigations involving
cybercrime, harassment, extremism, or disinformation campaigns. Forensic
analysis can uncover user profiles, posts, messages, metadata, and
behavioral patterns, aiding legal and investigative processes. This
makes Gettr a valuable source of information for law enforcement and
cybersecurity professionals.
iOS Gettr artifacts can be found at the following location:
private/var/mobile/Containers/Data/Application/<App-GUID>/Documents/db_****.sqlite
This section will discuss using ArtiFast to extract iOS Gettr artifacts
from iOS device files and what kind of digital forensics insights we can
gain from the artifacts.
After you have created your case and added evidence for the
investigation, at the Artifact Selection phase, you can select iOS Gettr
artifacts:
Once ArtiFast parser plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of iOS Gettr artifacts in ArtiFast.
iOS Gettr Users
iOS Gettr Messages
iOS Gettr Channels
iOS Gettr Attachments
For more information or suggestions please contact: ekrma.elnour@forensafe.com