This was probably a mere curiosity - we are able to take a copy of the contents; and do what with it exactly?
However, now we hear that researchers from Fraunhofer Institute for Secure Information Technology (SIT) have perfected a method to analyse the contents of the iPhone and extract all passwords stored in the Keychain.
The reason all this is possible is that, although a passcode is required to unlock access to the phone's contents, the cryptographic key is based entirely on information contained within the iPhone. This remains true as of iOS firmware v4.2.1
This can only be described as reckless in the extreme!
Remember, we say passwords when we describe access to VPNs, WiFi portals, MS Exchange accounts etc.
According to the SIT paper, "In current versions of iOS, the keychain contains user accounts including passwords such as email, groupware, VPN, WiFi, websites and often also passwords and certiï¬cates used in 3rd party apps. As these secrets are stored encrypted in the keychain, the questions is: Which key is used for the encryption and which practical barrier does it create for an attacker with access to the device."
As the paper demonstrates, the key is easy and the barrier is almost non-existent.