Apple's new mobile operating system isn't nearly as secure as the company claims. Apparently iOS 12 came with bugs that allow a fairly complicated process to bypass the code access.
Bypassing the password naturally gives access to its private data devices, such as photos, contact list and address book.
The process of exploiting the security hole is rather complex and requires the use of Siri, VoiceOver and applicationς Notes. Η μέθοδος λειτουργεί σε iPhone smartphones running iOS 12. These include models that support Face ID or Touch ID biometrics.
To circumvent the Face ID and Touch ID security mechanisms, you need to physically access the device (for a very short time) and also to know the victim's phone number.
To override your iOS 12 password, you need to call Siri from the lock screen and ask Apple's digital assistant to activate the VoiceOver service.
Then you should call it iPhone that you want to unlock from another device and at the time of the call, select the reply with message and press the "+" button. If the VoiceOver service is enabled, sending the message from smartphone του θύματος θα προκαλέσει ένα σφάλμα στο σύστημα, με αποτέλεσμα ο εισβολέας να μπορεί να έχει πρόσβαση σε απόρρητα δεδομένα της συσκευής, όπως στις φωτογραφίες, τη λίστα επαφών και το address book. Φυσικά μπορεί να δει τη λίστα με τις εξερχόμενες κλήσεις σας και να έχει περισσότερες και λεπτομερείς πληροφορίες για αυτές κάνοντας κλικ στο πλήκτρο «i».
The vulnerability was discovered by security expert Jose Rodriguez who has published two videos to prove the problem. At this time, vulnerability has not been repaired.
Watch the videos