- Edited
Interesting. If this attack is indeed a threat in real world situations, not just controlled lab conditions, this would certainty be something worth following / looking into.
This may be a stupid, or too specific, question - but does anyone know if this kind of attack would be able to brute force other profiles/users? - if the main profile has a password with extremely high entropy (assume it would take too long to brute force, even with the best hardware), but the secondary profile/profiles have simple PINs with very low entropy? Assuming the phone was recently turned off / rebooted of course.
And would it make a difference if the separate profile/user was unlocked and running when the phone was turned off / rebooted?