{"id":642494,"date":"2013-02-14T08:30:59","date_gmt":"2013-02-14T13:30:59","guid":{"rendered":"http:\/\/techcrunch.com\/?p=758053"},"modified":"2013-02-14T08:30:59","modified_gmt":"2013-02-14T13:30:59","slug":"new-ios-6-1-security-flaw-grants-limited-access-to-phone-app-photos-email-messages-facetime","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/642494","title":{"rendered":"New iOS 6.1 Security Flaw Grants Limited Access To Phone App, Photos, Email, Messages, FaceTime"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"70\" src=\"http:\/\/tctechcrunch2011.files.wordpress.com\/2012\/06\/ios-6-logo.jpeg?w=100&amp;h=70&amp;crop=1\" class=\"attachment-tc-carousel-river-thumb wp-post-image\" alt=\"ios-6-logo\" style=\"float: left; margin: 0 10px 7px 0;\" \/><\/p>\n<p>With just a few quick steps, it&#8217;s easy to open the phone app on any locked iPhone running iOS 6.1. From there a person has full access to the photo library, can edit contacts, send emails, text messages or even make a FaceTime call. It&#8217;s so easy that it&#8217;s downright silly.<\/p>\n<p>As shown in the video here, the process involves holding down the power button and aborting an emergency call. It worked for me although the timing is tricky.<\/p>\n<p>The flaw causes the phone to load the phone app, giving anyone full access to the dialer, contact list, voicemails, call history and photos by editing a contact. An email or text message can be sent by sharing a contact. FaceTime is accessible through the contacts as well.<\/p>\n<p><strong>Update:<\/strong> Apple has reached out to TechCrunch with the following comment: <\/p>\n<blockquote>\n<p>Apple takes user security very seriously. We are aware of this issue, and will deliver a fix in a future software update.<\/p>\n<\/blockquote>\n<p><span style=\"font-size:13px;line-height:19px;\">The exploit is fairly easy to access but the timing is tricky.<\/span><\/p>\n<ul>\n<li><span style=\"line-height:12.997159004211px;\">From a locked iPhone running iOS 6, load the emergency dial screen.<\/span><\/li>\n<li>Press and hold the power button and then hit cancel.<\/li>\n<li>Make a fake emergency call &#8212; I dialed 112 like in the video.<\/li>\n<li>Hang up\u00a0immediately.<\/li>\n<li>Hit the power button to put the phone back in\u00a0standby.<\/li>\n<li>Hit the home button to bring up the lockscreen<\/li>\n<li>Hold down the power button and at the three-second mark, hit the Emergency Call button.<\/li>\n<li>Keep holding the power button until the Phone App comes up.<\/li>\n<li>Hit the Home Button and release as if you&#8217;re taking a screen shot.<\/li>\n<\/ul>\n<p>The last bit is the hard part. The timing needs to be just right. It took me about 20 minutes to get the timing down.<\/p>\n<p><span style=\"font-size:13px;line-height:19px;\">While new to iOS 6.1, this isn&#8217;t the first time a simple workaround has resulted in similar access. A comparable exploit was found in iOS 4.1.\u00a0<\/span><\/p>\n<p>Apple will likely address <a  href=\"http:\/\/www.gizmodo.co.uk\/2013\/02\/you-can-bypass-the-ios-6-1-lockcode-screen-with-this-simple-technique\/\">this exploit<\/a> rather quickly. It&#8217;s a massive backdoor to some of the iPhone&#8217;s core functions.<\/p>\n<p><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='640' height='390' src='http:\/\/www.youtube.com\/embed\/MDkLpj3MM-c?version=3&#038;rel=1&#038;%23038;fs=1&#038;%23038;showsearch=0&#038;%23038;showinfo=1&#038;%23038;iv_load_policy=1&#038;%23038;wmode=transparent' frameborder='0'><\/iframe><\/span><\/p>\n<p>  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/tctechcrunch2011.wordpress.com\/758053\/\"><\/a> <\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?a=3pR9x6CD_N0:TMYUzwe8IJQ:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?i=3pR9x6CD_N0:TMYUzwe8IJQ:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?a=3pR9x6CD_N0:TMYUzwe8IJQ:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?i=3pR9x6CD_N0:TMYUzwe8IJQ:F7zBnMyn0Lo\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?a=3pR9x6CD_N0:TMYUzwe8IJQ:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/crunchgear?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>With just a few quick steps, it&#8217;s easy to open the phone app on any locked iPhone running iOS 6.1. From there a person has full access to the photo library, can edit contacts, send emails, text messages or even make a FaceTime call. It&#8217;s so easy that it&#8217;s downright silly. As shown in the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,7],"tags":[],"class_list":["post-642494","post","type-post","status-publish","format-standard","hentry","category-mobile","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/642494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=642494"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/642494\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=642494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=642494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=642494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}