As the Red Queen told Alice, it isn't etiquette to cut any one you've been introduced to. Locked iPhones, on the other hand, are not supposed to communicate with other devices before the formal introduction.

However, it appears that iPhones are, under limited circumstances, willing to share information with other devices when they shouldn't, even to the point where Heise researchers managed to implement a full backup of an iPhone, complete with plaintext passwords, which let itself be inappropriately paired to a Windows Vista PC.

More here.

David Harley CITP FBCS CISSP
ESET Research Fellow

ESET Threatblog (TinyURL with preview enabled): http://preview.tinyurl.com/esetblog
ESET Threatblog notifications on Twitter:
http://twitter.com/esetresearch; http://twitter.com/ESETblog
ESET White Papers Page: http://www.eset.com/download/whitepapers.php

Securing Our eCity community initiative: http://www.securingourecity.org/

Also blogging at:
http://amtso.wordpress.com/
http://avien.net/blog
http://blogs.securiteam.com
http://blog.isc2.org/
http://macvirus.com/
http://chainmailcheck.wordpress.com
http://smallbluegreenblog.wordpress.com/