The new bug that removes the passcode of iDevices does not provide access to user files

  Last night I told you that a new bug was discovered in iOS, allowing the removal of the passcode of iDevices and giving hackers access to the Phone application, together with the contact address and call list, but also access to photos/films with the help of a USB cable. iOS is configured in such a way that when connecting an iDevice with an active passcode, iTunes will refuse to recognize it, and the computer will display a partition with pictures/films, but it will be encrypted and will be accessible only in the situation in which the iDevice is unlocked with that security code. In this situation, the iOS retains the identity of the computer, and when it is reconnected to it, even blocked with a security code, it will display that partition with decrypted photos/films.

  Well, it seems that the researchers who discovered this bug didn't properly test its vulnerabilities, since it doesn't give users access to pictures/movies via a computer. Those from TNW I argue that although the bug provides access to the Phone application, connecting it to a computer via USB will not result in the possibility of copying photos and videos from the terminals. In practice, the respective partition will remain encrypted, but only if the iDevice is connected to a new computer, which it does not recognize.

  Even if the bug only provides access to the Phone application, it is dangerous, because anyone can access your contacts and call list, but can also make phone calls.