The new functional της Apple για κινητές συσκευές δεν είναι και τόσο ασφαλές όσο ισχυρίζεται η company. Apparently iOS 12 came with bugs that allow a fairly complicated process to bypass the password.
Bypassing the password naturally gives access to confidential device data, such as photos, contact list, and address book.
The process of exploiting the security hole is rather complex and requires the use of Siri, VoiceOver and the Notes app. The method works on iPhone smartphones that have iOS version 12 installed. These include models that support Face ID or Touch ID biometrics.
To circumvent the Face ID and Touch ID security mechanisms, you need to physically access the device (for a very short time) and also to know the victim's phone number.
To bypass the passcode in iOS 12 you have to call Siri from the screen locking and ask Apple's digital assistant to turn on the VoiceOver service.
Then you should call it iPhone that you want to unlock from another device and at the time of the call, select the answer with message and press the “+” button. If the VoiceOver service is enabled, sending the message from the victim's smartphone will trigger an error in the system, allowing the attacker to access sensitive device data such as photos, contact list and address book. Of course he can see the list of your outgoing calls and have more and detailed information about them by clicking on the "i" key.
The vulnerability was discovered by security expert Jose Rodriguez who has published two videos to prove the problem. At this time, vulnerability has not been repaired.
Watch the videos