Sign up to our newsletter
As the Red Queen told Alice, it isn't etiquette to cut any one you've been introduced to. Locked iPhones, on the other hand, are not supposed to communicate with other devices before the formal introduction.
However, it appears that iPhones are, under limited circumstances, willing to share information with other devices when they shouldn't, even to the point where Heise researchers managed to implement a full backup of an iPhone, complete with plaintext passwords, which let itself be inappropriately paired to a Windows Vista PC.
David Harley CITP FBCS CISSP
ESET Research Fellow
ESET Threatblog (TinyURL with preview enabled): http://preview.tinyurl.com/esetblog
ESET Threatblog notifications on Twitter:
ESET White Papers Page: http://www.eset.com/download/whitepapers.php
Securing Our eCity community initiative: http://www.securingourecity.org/
Also blogging at:
Author David Harley, ESET