Apple’s iOS 6.1 passcode bypass exploit has been receiving a lot of attention since it was stumbled upon earlier this week with a fix planned for early next week.

According to a new research published yesterday by Germany’s Erlangen University, passcodes may not be a match for freezing temperatures as researchers were able to bypass a Galaxy Nexus’ security settings to read the phone’s memory simply by sticking it in the freezer for a while. The method is called a “cold boot” attack and was first demonstrated on PCs in 2008.

The cold boot attack was performed, but through an approach that differs from how it’s done to PCs. The Galaxy Nexus retains information after a shutdown for up to two seconds, which researchers were able to extend it to a five or six second retention window. Once researchers were able to have the phone reach that length of time, they were able to successfully pull data from the device with the help of a computer.

Filed in Cellphones. Read more about Galaxy Nexus and research.

Samsung Galaxy Nexus
1280x720 Super AMOLED
Price (approximative)
~$429 - Amazon
5 MP
135 g
1750 mAh
Launched in
TI OMAP 4460 + None
Storage (GB)
User Comments