Apple's new mobile device is not as safe as the company claims. As can be seen, iOS 12 has come up with errors that allow for a rather complicated process to bypass the password.
Bypassing the password naturally gives access to confidential device data, such as photos, contact list, and address book.
The process of exploiting the gap security είναι μάλλον περίπλοκη και απαιτεί τη χρήση της υπηρεσίας Siri, του VoiceOver και της εφαρμογής Notes. Η μέθοδος λειτουργεί σε iPhone smartphones running iOS 12. These include models that support Face ID or Touch ID biometrics.
To bypass the Face ID and Touch ID security mechanisms you will need to have physics access to the device (for a very short time), but also know the victim's phone number.
To override your iOS 12 password, you need to call Siri from the lock screen and ask Apple's digital assistant to activate the VoiceOver service.
Then you should call it iPhone that you want to unlock from another device and at the time of the call, select the reply with message and press the "+" button. If the VoiceOver service is enabled, sending the message from the victim's smartphone will trigger an error in the system, allowing the attacker to access sensitive device data such as photos, contact list and address book. Of course he can see the list of your outgoing calls and have more and detailed information about them by making click on the "i" key.
Η vulnerability discovered by security expert Jose Rodriguez who has published two videos to prove the problem. At this time, vulnerability has not been repaired.
Watch the videos