strung out
💩 🤣 🍆 💦 🧐 👻 🐝 🐈⬛
is the £505 on the o2 website likely to be the cheapest i can get a contract free iphone 4 for?
Researchers have devised a method for stealing passwords stored on locked iPhones and iPads that doesn't require cracking of the device's passcode.
The technique, disclosed on Thursday by members of the Fraunhofer Institute for Secure Information Technology, requires physical access to the targeted iPhone or iPad, so remote attacks aren't possible. But it takes less than six minutes and carry out, and the after effects are easy to conceal, making it ideal to carry out on devices that are lost, stolen or temporarily unattended.
The hack exploits cryptography in the iOS password management system – known as keychain – that uses a secret key that is completely independent of the device's passcode. That saves attackers who manage to access the file system the hassle of deducing a key that's based on a passphrase set up by the user.
“After using a jailbreaking tool, to get access to a command shell, we run a small script to access and decrypt the passwords found in the keychain,” the researchers wrote in a paper (PDF). “The decryption is done with the help of functions provided by the operating system itself.”
The script also reveals always-encrypted account settings for things like user names and server addresses for all stored accounts, as well as the account clear-text secrets. The hack worked on a locked iPhone 4 running iOS 4.2.1, which was the most current firmware version at time of writing. A demo of the attack is available on YouTube - you can view it below.
“The accessibility of keychain secrets without requiring the passcode is considered a result of a trade-off between system security and usage convenience,” the researchers wrote. “The passwords for network related services should be available directly from device startup, without having to enter the passcode first.”
The technique doesn't retrieve passwords stored in parts of the device that remain off limits until the passcode is entered.
Still, the hack can reveal a wealth of sensitive codes, including those used for virtual private networks, Wi-Fi networks, LDAP accounts, voicemail systems and Microsoft Exchange accounts. And that's likely to spook large business customers with employees that use the devices to connect to sensitive company systems. ®
Seeing as all the Apple staff managed to make it in, I wouldn't say it was a huge factor - low turn outs were reported elsewhere too.Wasn't the massive dump of snow and freezing temperatures a factor?
A similar situation was seen in San Francisco, where cold temperatures couldn't be blamed for low turnout. According to CNET, only two people were in line at Apple's Stockton Street flagship store just minutes before opening, with "literally more Apple Store employees, police officers and reporters--each--than people in line to buy iPhones."
Fuck me you're touchy! I was facepalming the laughable flop of a launch, but now you've earned your own facepalm. And here it is, especially for you:Why are you facepalming? I was supporting what you said when I found that article.
fucksake....
In fairness, there was another big launch party in Minneapolis last night, too.
Me too, but they must be looking at what's happening with Android which registered an astonishing 888.8% growth in 2010.I would be surprised if Apple came up with anything cheap.
Fuck me you're touchy!
I would be surprised if Apple came up with anything cheap.
Apparently of prostitutes that own a smartphone, 70 per cent have BlackBerries while just 11 per cent own iPhones.
This a recent study you've undertaken?
I'm surprised there isn't an app for it tbh.
It would be making the best use of location based services.