China “Hawkeye terminal” Claims To Extract data for any devices

CETC Institute 23, the device is capable of extracting Android/iOS chat records without needing to unlock devices, detecting VPN usage, and recovering remnants from apps such as Telegram.

Compared to traditional manual searches, the Hawkeye-B boasts remarkable automation and intelligence: within minutes of a traveler’s phone connecting to the device,

This only works if your device is unencrypted. So AFU or a bad system or if you use an to weak password in your threat model.

If you for example use a Pixel 8a with GrapenOS it uses AES-256 which isn’t breakable. And even if there were security holes, its not breakable in minutes.
So if you are really worried about it. Use a long passphrase with 7 or 12 words (English, Latin and what every you want) and deactivate all other login methods (pin and biometrics).
Before you enter border control just restart your device.

Then the only thing they could do is try to bruteforce the device. All mobile phones have a antibruteforce mechanism, so lets say they could bypass any antibruteforce mechanism built into GraphenOS. Even than a 12 words long passphrase would take multiple hundreds of thousand of years.

Even if you clear your chat history and uninstall sensitive software, it can still extract large amounts of data from the system residues, including:

Because its not overwritten and so not gone.