Another iPhone passcode bypass spell revealed
Turn off Siri, remove SIM, add unicorn blood, phone and contacts are yours
Apple's recent release of iOS 6.1.3, complete with fix for the weird keypress sequence that allowed access to and export of iPhone address books, seems to have been just a little bit futile after a new bug with the same effects emerged.
The source of the new method is someone or something called Vbarraquito, whose youTube channel offers the video below demonstrating the new magic unlock spell.
The new iPhone unlocking spell involves turning off Siri (where present), messing around with Voice Control, ejecting the SIM and cooking a potion based on unicorn blood. Once the planets align, the iPhone can then make calls without the passcode being entered and the address book is accessible.
Vulture South's fat-fingered staff have been unable to replicate this method, but several others claim to have done so.
Apple will doubtless be more than a little embarrassed at this new gaffe, which further damages its reputation for both security and attention to detail.
It's safe to assume Apple will soon offer a counter-spell in the form of an iOS update, this time paying special attention to all manner of keypress combinations. Apple's also due to start talking up the successor to iOS 6, probably at its worldwide developer conference tipped for June. If a slide or two in the iOS 6+x presentation doesn't make mention of enhanced security, colour us surprised.
As to the question of whether this latest spell will dent iPhone sales, The Reg suggests readers seeking an answer use our search facility to look for pieces on “antennagate” and “Apple Maps”, then consider Apple's share price and Samsung/Android's growing market share. Coincidence? You be the judge. ®
COMMENTS
Potion containing unicorn blood?
Have you checked that it's not contaminated with horse?
Apple will doubtless be more than a little embarrassed at this
No chance, anyone who can charge the amount they do of a couple of $$$ worth of flash is clearly quite incapable of feeling any senses of embarrassment about anything.
Re: But at least Samsung's bypass bug is more accessible...
"What I really wanted to highlight was security, or the lack of it on the Android front. Which seems attract botnets and key loggers by the boat load"
Problem is, all those reports are bogus all from companies trying to tell antivirus and malware "solutions" to problems that don't exist for all but a few pirates that sideload warez, and the same problems exist for jailbroken phones also.
So the real failure is YOUR understanding of the problem, as it's clear you have been sucked in by the FUD.
Re: But at least Samsung's bypass bug is more accessible...
"Your childish rant in support of your way to old old tech makes you look more ridiculous than being seen with said shite."
So says the master of the childish rant
Samsung even copies Apple's security shortcomings
Shortly after the Apple screen lock bug was reported, one was reported for Samsung. Now on the same day as this report of a second lock screen bug comes out for Apple, the guy who found the original Samsung lock screen bug found a second one on that platform that's even worse than the first - it allows completely disabling the lock screen, no matter what type of lock (PIN, passsword, or face) that's being used, with full access to the phone.
http://news.cnet.com/8301-1009_3-57575305-83/samsung-lock-screen-flaw-found-company-working-on-fix/
Apparently this is a bug introduced by Samsung, generic Android is not vulnerable.
