by Davide Gabrini, Andrea Ghirardini, Mattia Epifani and Francesco Acchiappati
During the hacking camp MOCA 2016, at the end of a talk held by Davide “Rebus” Gabrini on passcode circumvention methods on mobile devices, a bystander offered an intriguing challenge: he offered for research purposes a smartphone to find out if and how someone could crack it, overcome security and extract information.
The smartphone was a Jolla White 16GB JP-1301, equipped with the Sailfish 188.8.131.52 operating system. The device was previously reset twice by the owner and it was protected by a 5-digit PIN without encryption on the internal storage. Moreover, the developer mode was not active because it required a Jolla account that was not available.