BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/5704020041662464/lesson/2708d6953d1dd4ff81b5b0d1f74ac704?ref=outlook-calendar
SUMMARY:Physical Access
DTSTART;TZID=America/Los_Angeles:20260502T190000
DTEND;TZID=America/Los_Angeles:20260502T200000
LOCATION:https://www.learndesk.us/class/5704020041662464/lesson/2708d6953d1dd4ff81b5b0d1f74ac704?ref=outlook-calendar
DESCRIPTION: 
In this video, we'll explore what an attacker could do having physical access to your smartphone.

So, first, it's important to realize that there is potential for data leakage even when the smartphone is locked.
How?

Through notifications of emails or messages
Through widgets, like the calendar one
Via intelligent assistants like Siri from Apple or Google&rsquo;s own assistant

There are limits to what someone can do when the screen is locked of course, but we tend to overlook the danger associated with it.&nbsp; And the past has shown that some nasty bugs can be leveraged to extract even more information, like contacts, photos, and emails.

Like in 2018 for example, with the release of iOS 12
Jos&eacute; Rodriguez, from Spain, uncovered a way to send pictures via Messages without knowing the passcode. Here's a quick video demonstrating the flaw. This bug has been patched by Apple but relied on the use of Siri on the locked screen to activate VoiceOver.
This kind of...

https://www.learndesk.us/class/5704020041662464/lesson/2708d6953d1dd4ff81b5b0d1f74ac704?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR