A security researcher reportedly discovered a way to "brutally force" the lock code of an iPhone, but Apple has since repelled it.
Matthew Hickey revealed the alleged feat Twitter Friday, tweeting that the method could be used to circumvent the wrg password limits of an iPhone – even versis the most recent of iOS.
Normally, iPhones will lock after a certain number of incorrect password entries. They can even be cfigured to erase the data after the wrg password. This, in essence, is a powerful defense against "brutal forcing" – in simple terms, a method that involves the use of a computer to enter all possible codes.
But Hickey said that he had found a way to bypass this security limit. Essentially, his method involved sending all potential passwords between 0000 and 9999 "all in e pass" rather than just e at a time. Due to an alleged loophole, this would exceed the security limit.
"If you send your brute force attack in a lg chain of entries, it will treat them all and bypass the data erase functi," Hickey adds. The security researcher reported the vulnerability to Apple before tweeting about it
Of course, such a security breach would make many iPhones vulnerable to a relatively simple method of bypassing encrypti – rather than the more tools Sophisticated devices used by hackers like GrayKey.
Fortunately, Hickey's cclusis can be wrg. An Apple spokesman then challenged the authenticity of the vulnerability of ZDNet ….