According to a Wired interview with hacker, lecturer and iPhone developer Jonathan Zdziarski, the iPhone 3GS encryption is remarkably easy to crack and steal data from.
Zdziarski says it's all too simple, but you need physical access to the phone. He found that with common jailbreaking tools such as Red Sn0w and Purple Ra1n, an entire disk image of the iPhone could made.
But breaking the 3GS encryption and accessing personal data from the device would require much less time: less than 2 minutes, he claims.
This isn't the first security compromise to embarrass Apple in the last couple of years. Last year, Macforum users found that they could get around the iPhone's locked screen mode (version 2.0.2), by selecting emergency mode and the home button, giving them full access to multiple functions on the phone.
Zdziarski notes that greater vulnerabilities arise from the way the 3GS works as a device, not just its security flaws. The 3GS caches keyboard strokes, logged in Safari, and Zdziarski believes that this could potentially allow hackers and thieves to gain access to credit card details, made from orders online.
A number of third party vendors have already created remote wiping software in the last couple of years to combat the rise in thefts of smartphones. Kaspersky currently offer an all-in-one software product that can detect, track and remotely secure a phone when it falls into thieves hands.
Apple also offer a tracking service as part of an annual MobileMe subscription. The tool utilises GPS to the owner's iPhones. In recent times, this act of tracking down the theft, has given way to the rise of 'mobile vigilantism', where phone owners often attempt to find and confront the thieves themselves without police involvement.
Issue: 339 | June 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.