Thanks for checking on this. While our consultant demonstrated it to me, iTunes was not needed (he actually uninstalled it before the demo). He just used redsn0w to jailbreak and then used TotalCommander TPot to access file system. Did you try that way?
OK. Hope you don't pay this consultant too much! Either that, or put me on your payroll. Anyhoo, bygones! Here's my latest results.
YoungOne, this is a good lesson on being diligent and very precise in your experiments when trying to help folks out. That's not a criticism! Just a bit of guidance
Always try to compare "like for like".
So, here's what I tried.
I secured my iPad with a strong passcode (you can do this in settings, and it makes the passcode longer than 4 digits) - This is just good practice and makes the encryption of the file system more secure.
I started with a clean build PC - No iTunes.
Connected the iPad whilst it was still LOCKED. The device drivers loaded to allow Windows to see the Camera Roll. This is what you would expect on a PC without iTunes.
Result - I COULD NOT SEE ANY CONTENT ON THE CAMERA ROLL. The device is there, but you don't get access because the encryption is secure and in place. This is very good news.
Second, I installed latest iTunes, and just like my previous test, when I connected my locked iPad it said the iPad had to be UNLOCKED before it could proceed. I DID NOT do this.
I installed TotalCommander and the plugin and tried to access the iPad. I COULD NOT. The iPad IS secure as long as you DO NOT unlock it.
Now, I finally unlocked the iPad, and presto, iTunes, Windows, and TotalCommander can SEE the iPad. Only once the passcode is provided on the iPad is the encryption disabled.
Now, the interesting bit. I uninstalled iTunes and everything else I could think about (bonjour, apple device service, etc.). And what do you know?
I could STILL see the iPad pictures in the camera roll. and TotalCommander could STILL see the contents of the iPad. So, it looks like the encryption details are stored close to the device driver and therefore once unlocked it remains unlocked on the PC.
This confirms what you saw from the consultant offthegrid, but it is obviously a flawed hypothesis. Because the device was already unlocked on his laptop, just uninstalling iTunes did not remove the details. I am sure there will be a way to get rid of the key somehow, but just removing iTunes (and the other Apple components) DOES NOT DO IT.
Therefore, in a real world scenario, without access to the passcode, I think I stand by my position, that everything IS SECURE, provided the passcode to the device is not used. So a theif plugging a device into a new PC and jailbreaking, won't get access to the file system easily at all.
OK? If anyone else would like to test it out, I'd be happy to hear! You up for it again YoungOne?
Another couple of fun filled hours