In short, this guy hacks a 5C by replacing the NAND chip with a clone and sets the amount of wrong codes to 0, giving him an infinite amount of wrong passwords without locking the device to infinity.
Also, on BBC
http://www.bbc.com/news/technology-37407047
As per the Cambridge scientist's description
Published on Sep 15, 2016
This is video to support the research paper "The bumpy road towards iPhone 5c NAND mirroring". It shows what the process of Apple iPhone 5c hardware NAND mirroring involves and demonstrates the successful attack on the limit for passcode retry counter. Full paper is available here: http://arxiv.org/abs/1609.04327
Please read the following blogs which discuss the paper:
https://www.lightbluetouchpaper.org/2...
https://www.lawfareblog.com/securing-...
https://www.schneier.com/blog/archive...
Also, on BBC
http://www.bbc.com/news/technology-37407047
As per the Cambridge scientist's description
Published on Sep 15, 2016
This is video to support the research paper "The bumpy road towards iPhone 5c NAND mirroring". It shows what the process of Apple iPhone 5c hardware NAND mirroring involves and demonstrates the successful attack on the limit for passcode retry counter. Full paper is available here: http://arxiv.org/abs/1609.04327
Please read the following blogs which discuss the paper:
https://www.lightbluetouchpaper.org/2...
https://www.lawfareblog.com/securing-...
https://www.schneier.com/blog/archive...