iOS 12 unlock Apple's operating system

Το νέο λειτουργικό της Apple για κινητές συσκευές δεν είναι και τόσο ασφαλές όσο ισχυρίζεται η εταιρεία. Όπως φαίνεται το iOS 12 ήρθε με σφάλματα που επιτρέπουν με μια αρκετά περίπλοκη διαδικασία την παράκαμψη του access.

Bypassing the passcode of course gives access to confidential device data such as , the contact list and the address book.iOS 12

The process of exploiting the security vacuum is rather complicated and requires the use of Siri, VoiceOver and Notes. The method works on iPhone smartphones that have the iOS 12 version installed. These include models supporting biometric Face ID or Touch ID.

To circumvent the Face ID and Touch ID security mechanisms, you need to physically access the device (for a very short time) and also to know the victim's phone number.

To bypass him to access iOS 12 you need to call up Siri from the lock screen and ask Apple's digital assistant to turn on the VoiceOver service.

Then you should call it iPhone that you want to unlock from another device and at the time of the call, select the reply with message and press the "+" button. If the VoiceOver service is enabled, sending the message from the victim's smartphone will trigger an error in the system, allowing the attacker to access sensitive device data such as photos, contact list and address book. Of course he can see the list of your outgoing calls and have more and detailed ones for them by clicking on the "i" key.

The vulnerability was discovered by security expert Jose Rodriguez who has published two videos to prove the problem. At this time, vulnerability has not been repaired.

Watch the videos

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).