I was curious about the data encryption method of iOS4, and more specifically, how it operates when one uses the "Erase all content and settings" feature. As far as I know, iOS4 merely drops the encryption key to all of the data on your drive (which is encrypted). This is supposed to make it inaccessible. This method is unlike the older versions, where it rewrote over all of the data (with 1's and 0's?) making it an unrecoverable garbled mess.
Now onto my question, which is that I am assuming all of your data remains on the drive once the encryption key is dropped, so wouldn't it be possible to simply jailbreak the phone, load up openSSH and dump all of the data to your pc, thus being able to sift through whatever is there? Including whatever you may have deleted in the past. I assumed the encryption access key only applies to how iOS4 itself accesses the data.
Is this correct? If so, would it seem that the older method of data "removal" was actually more secure? I am also aware of people transferring massive playlists from itunes to their devices, equal to its total capacity, thus rewriting over most of anything which had been previously deleted. I am not sure how effective this method is either, however.
Now onto my question, which is that I am assuming all of your data remains on the drive once the encryption key is dropped, so wouldn't it be possible to simply jailbreak the phone, load up openSSH and dump all of the data to your pc, thus being able to sift through whatever is there? Including whatever you may have deleted in the past. I assumed the encryption access key only applies to how iOS4 itself accesses the data.
Is this correct? If so, would it seem that the older method of data "removal" was actually more secure? I am also aware of people transferring massive playlists from itunes to their devices, equal to its total capacity, thus rewriting over most of anything which had been previously deleted. I am not sure how effective this method is either, however.
Last edited: