The method is blocked and the hack doesn’t work, it adds

Jun 25, 2018 05:38 GMT  ·  By

A hack that made the rounds a couple of days ago revealed an alleged method of bypassing the iPhone passcode by simply sending passcode combinations in one string, thus getting around the restrictions that Apple has implemented in iOS.

Researcher Matthew Hickey demonstrated, including in a video that he posted online, that it was possible to use this method in order to avoid getting the device wiped due to too many incorrect passcode input attempts, thus eventually obtaining access to a locked iPhone.

But as it turns out, this hack isn’t working, and Apple explained in a brief testing that there’s no reason to be concerned that someone could break into an iPhone.

“The recent report about a passcode bypass on iPhone was in error, and a result of incorrect testing,” an Apple spokesperson was quoted as saying.

Apple’s focus on security

Additionally, Hickey has also posted a new tweet to explain that when sending a single string including more passcode combinations, iOS doesn’t process them all, despite the screen of the iPhone showing otherwise.

“The pins don't always goto the SEP in some instances (due to pocket dialing / overly fast inputs) so although it "looks" like pins are being tested they aren't always sent and so they don't count, the devices register less counts than visible,” he posted.

Apple is paying more attention to iOS security these days, and iOS 12 is particularly focused on blocking exploits that could allow unauthorized access to the stored data. One way to do this is to restrict USB access to the iPhone when the device hasn’t been unlocked for more than an hour.

This method is believed to be blocking hacks like an exploit used by GrayKey, a device whose role is to brute force an iPhone and extract user information. This device is used by law enforcement and governments, and people familiar with the matter claim its developers have already found a way to bypass the new USB restricted mode.