Irregular Expressions

Jun 4 2010   11:47PM GMT

iPhone access vulnerability



Posted by: Dan O'Connor
Tags:
iPhone OS data

You may have seen some stories talking about the recently discovered vulnerability in the iPhone OS that allows someone to gain access to the device even with a pin on it.

I have seen a couple different reports on what actually happens and how, ( I wish I had one at this point to mess around with ).

But the two stories are like this,

1) You connect a iPhone that you have presumably beat from someone with a rubber hose that is locked.  Connect it to a Ubuntu  Lucid Lynx install, and like magic the file system is mounted.  It’s reported that you will have access to some but not all of the users files.

2) Same as before you have physical access to a iPhone, but in this senario you power off the phone and connect it to the Lucid Lynx install then power it up.  The phone is mounted on the way up before the lock can kick in to stop it.

One to me seems more realistic, but I am going to try and replicate this with my iPad before I get any deeper.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: