It works by first jail breaking the phone to expose security flaws in the OS, then proceeds to brute-force the default four-digit pin, which only has 10,000 possible combinations to begin with. This all happens in under two minutes. And once the phone is open all data is fair game — logs, contacts, even deleted items.