Some thoughts on the ‘vulnerability’ of the 3G S $AAPL

Hacker Says iPhone 3GS Encryption Is ‘Useless’ for Businesses | Gadget Lab | Wired.com.

Some counterpoints:

  • The iPhone 3G S has to be in the physical possession of the hacker (instead of an over-the-air attack).
  • The iPhone can be wiped remotely (however, MobileMe, push, and Find My iPhone must be turned on, and must be connected to the internet).
  • The iPhone is more likely to be profiled as a valuable piece of hardware than for its data potential–the BlackBerry is a well-recognized business device and would be a more likely target for data thieves.

Some additional thoughts:

  • The iPhone has thus far been a consumer device, although the trickle in enterprise adoption makes this alarm-sounding well timed.
  • Apple does not currently provide enterprise management software for either desktops or phones, which (beyond security) is probably the greatest barrier to enterprise acceptance.