@marcan42 Combine a NAND simulator with a capacitive "finger" simulator (as shown at DefCon a few years back) built out of LEGO, boom! …
-
-
Replying to @ScooterComputer
@ScooterComputer Actually those Chinese PIN crackers submit PINs via USB, seems it'll take HID input or something like that.4 replies 0 retweets 0 likes -
Replying to @ScooterComputer
@ScooterComputer No jailbreak. If they injected software they wouldn't need to crack anything. It's the replay attack except abusing a bug.1 reply 0 retweets 0 likes -
Replying to @marcan42
@ScooterComputer ... basically a race condition that means that if you power down the phone fast enough the retry counter isn't incremented.1 reply 0 retweets 0 likes -
Replying to @marcan42
@ScooterComputer (they fixed that in newer iOS versions)1 reply 0 retweets 0 likes -
Replying to @ScooterComputer
@ScooterComputer Right, because they fixed the NAND update race condition. But the mechanism is the same, you just need a full NAND sim now.1 reply 0 retweets 0 likes -
Replying to @ScooterComputer
@marcan42 And I completely misunderstood that video. I thought they were abusing the touchscreen capacitance to "send" PINs, vs USB.1 reply 0 retweets 0 likes
@ScooterComputer Nah, the thing on the screen is a light sensor to detect whether the unlock was successful or not.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.