An iOS oversight: exploiting device trust and backups

Posted by David Longenecker on Sep 23

Posted in more detail at:
http://www.securityforrealpeople.com/2015/09/exploiting-ios-backups-for-fun-and.html

iOS (including iOS 9) have a chink in their security model’s armor.

Enabling an iOS device to trust a new computer is a one-click operation –
no password or PIN is required. As long as the iOS device is logged in and
not screen locked, one click is enough to tell the iPhone or iPad that this
computer can be trusted. Once trusted,…

Leave a Reply