The popular YouTuber EverythingApplePro brought to the scene a device that can “enter” and attack any iPhone 7 and iPhone 7 Plus, discovering the security code, the passcode, without major problems, just having the supported versions for $500.
Shoot iPhone security with brute force
The device has a compact size and its action is exceptional. It features 3 USB ports, capable of attacking iOS security through brute force, discovering the operating system access code on 3 devices simultaneously. In order to explain, in a way, this invasion of the Cupertino wall, YouTuber justifies saying that the tool takes advantage of a smartphone data recovery gap, which allows users to enter as many password attempts as they need. The vulnerability only affects iPhone 7 and iPhone 7 Plus running versions of iOS that are between 10.3.3 and 11 Beta, according to the same YouTuber.
If the iPhone runs a version older than the above mentioned, the attack system will have to import iOS 10.3.3 firmware for iPhone 7 or iPhone 7 Plus, in order to be able to use brute force. But the most frightening part of this story is that as a rule, the user, in order to take certain steps, has to enter their access code, but this cracker device automatically passes over the security code.
But is it really that easy?
It’s not difficult, but it may take a few days for the system to break your iPhone code, depending on the complexity of the access code you have chosen. If you have an older model, other than an iPhone 7 or an iPhone 7 Plus, then you’re safe, this device that “cracks” the iOS access code, does not work on any other device beyond iPhones 7. YouTuber, who has been collecting over the past several years iOS errors, said that it had never seen a level of sophistication in the attack as the device performs this. Certainly, the tech giant Apple is already preparing a correction to this problem, at a time when it is only a few weeks to release the final version of iOS 11. As we know, iOS 11 is back on the rise regarding security and privacy systems of the user. So, what do you think about this severe vulnerability? Simply share your views and thoughts in the comment section below.