Last week we talked about Micros Systemation's XRY software, which is able to bypass the password protection iGadgets, giving full access to the information contained in the device. Community developer Will Strafach (@chronic) jailbreak came to the public to explain exactly how it works.
Micros Sys software uses the limera1n tool, developed by George Hotz (Geohot). How does it exploit a vulnerability in iGadgets using the A4 chip, XRY * no * is able to extract data from the newest Apple devices, which use A5 / A5X chips: iPhone 4S, iPad 2 and third generation iPad. In fact, "anyone" could get this information using limera1n on older devices. The merit of Micros Sys, here, was to develop something easy for laymen to understand.
Another point contested by Strafach was the time to ?unlock? the device. In the video created by the company, they can access information from an iPhone in less than two minutes. However, this was only possible because the password used on the phone was 0000. Any other combination of numbers would require much more time for the software to decode, in which case, the longer the better.
In short: if the user has a password other than 0000, he is more protected than he thinks even though it is possible to access the device's data, but not in two minutes, as disclosed by the company. And the most important: if you have a state-of-the-art device, you need not worry.