(no title)
lmcd | 10 years ago
1) Have zero-day ([0]) that can be used to deliver executable payload over SMS (think Stagefright). iOS devices can receive text messages before the filesystem is decrypted. Perhaps Apple should close this vector.
2) Deploy dylib that patches the SpringBoard UI (where the lock screen lives), disabling the code that counts incorrect passcode attempts
3) Brute force the passcode
[0] http://www.wired.com/2015/11/hackers-claim-million-dollar-bo...
jamesrom|10 years ago
Perhaps. However, it's very likely that receiving SMS before decryption is not a bug, but a feature.