http://thenextweb.com/apple/2011/02/10/ ... x-minutes/
The attack requires possession of the iPhone and targets the handsets individual keychain, the iPhoneâ€™s password storage platform. Researchers, utilising existing exploits, are simply able to jailbreak the device, install an SSH server on the device that allows them to run queries and execute third-party software on the phone.
best browser made by mankind! Linux 188.8.131.52-9-x86_64 SUSE LINUX 11.1