Apple’s iOS 6.1 passcode bypass exploit has been receiving a lot of attention since it was stumbled upon earlier this week with a fix planned for early next week.

According to a new research published yesterday by Germany’s Erlangen University, passcodes may not be a match for freezing temperatures as researchers were able to bypass a Galaxy Nexus’ security settings to read the phone’s memory simply by sticking it in the freezer for a while. The method is called a “cold boot” attack and was first demonstrated on PCs in 2008.

The cold boot attack was performed, but through an approach that differs from how it’s done to PCs. The Galaxy Nexus retains information after a shutdown for up to two seconds, which researchers were able to extend it to a five or six second retention window. Once researchers were able to have the phone reach that length of time, they were able to successfully pull data from the device with the help of a computer.

Filed in Cellphones. Read more about and .

4.65"
  • 1280x720
  • Super AMOLED
  • 316 PPI
5 MP
  • f/ Aperture
1750 mAh
    1GB RAM
    • TI OMAP 4460
    • None
    Price
    ~$429 - Amazon
    Weight
    135 g
    Launched in
    2011-10-01
    Storage (GB)
    • 16

    Discover more from Ubergizmo

    Subscribe now to keep reading and get access to the full archive.

    Continue reading