They show how to unlock an iPhone with a code through brute force

Much has been said about "Black boxes" that promise to unlock an iOS device for prices ranging between 12.000 and 15.000 euros. However, it doesn't seem like the only method. A security analyst has shown that it is capable of unlocking a coded iPhone through a brute force system.

Let's take a look at this curious video in which the user demonstrates unlocking the iPhone in theory in a relatively easy way, which could save costs for those who spend thousands of euros on these boxes that allow access to an iPhone. The question now is: How long will Apple take to fix this through a security patch?

The security analyst Mathew hickey who has contacted ZDNet has been the one who has shown this curious method on his Twitter account, although the reality is that it does not explain much about the procedure that has been followed for it.

He explained that they connect the iPhone or iPad to a system that sends impulses to the keyboard, giving absolute priority over the rest of the device's functionalities. Enter the access codes one by one and then wait a while. This is how it supposedly bypasses the iPhone data lock and wipe system.

The truth is that it is not too clear how it does it, the reality is that Apple has already thought about this and for iOS 12 a system has been included that prevents hacking through prolonged USB connections. One more chapter in the intense war between hackers and the Cupertino company. The problem is that this method cannot be considered 100% effective, much less fast, it will obviously depend on the strength of the password itself. We will continue to report on this possibility of entering a foreign iPhone.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.