My first guess when I read about these "backdoors" was that there probably was a legitimate use for all of them and they were there for uses where the full device encryption introduced in iOS4 would become an issue. The obvious clue was that it required a paired machine the user of the iPhone had to confirm before the encryption related keys would be shared. For a data thief or spy this would mean that they would have to trick the target first into pairing their phone with one of their devices before being able to even decrypt any of the data.
However I doubt this will do anything to deter the anti-Apple diehards who will keep on using this as evidence of ether NSA backdoors or Apple's shoddy security.
Complaining about this is like complaining that a door is a security risk because you can leave it unlocked if you want to...
You didn't read the report. This backdoor allows someone to bypass your passcode and encryption to access personal information on your phone. It doesn't matter if your phone is locked. For the record, I like Apple's products and ecosystem quite a bit. This code however can be used for the wrong purposes and is a security risk.
----------
What, exactly, does a story on iOS security and the data Apple mines from you have to do with Politics, Religion, Social Issues... then Mac Rumors? Or did you want to control who could post on this topic?
I think so, really don't need the thread getting flamed because it's controversial. I appreciate that they are keeping the thread to people that are more seriously interested in Apple.
----------
Again you say it, but haven't proven it. Show, or even just find, proof that someone can violate a non jailbroken phone using any of these.
So I guess what we need are a host of independent researchers to verify that these flaws exist. Any takers?