this post was submitted on 09 Nov 2024
978 points (98.3% liked)

Technology

59287 readers
4401 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Apple quietly introduced code into iOS 18.1 which reboots the device if it has not been unlocked for a period of time, reverting it to a state which improves the security of iPhones overall and is making it harder for police to break into the devices, according to multiple iPhone security experts. 

On Thursday, 404 Media reported that law enforcement officials were freaking out that iPhones which had been stored for examination were mysteriously rebooting themselves. At the time the cause was unclear, with the officials only able to speculate why they were being locked out of the devices. Now a day later, the potential reason why is coming into view.

“Apple indeed added a feature called ‘inactivity reboot’ in iOS 18.1.,” Dr.-Ing. Jiska Classen, a research group leader at the Hasso Plattner Institute, tweeted after 404 Media published on Thursday along with screenshots that they presented as the relevant pieces of code.

you are viewing a single comment's thread
view the rest of the comments
[–] ohellidk@sh.itjust.works 44 points 3 days ago* (last edited 3 days ago) (26 children)

well it's kind of a selling point. I'm just too used to using android, though.

Edit - there's something for that too, cool!

[–] ContrarianTrail@lemm.ee 7 points 3 days ago (8 children)

I'm the only guy in my (small) friend group who still used pattern code instead of fingerprint so I take that to mean my phone is by default more difficult to break into than most. Giving my fingerprint to a giantic tech firm has always seemed like a bad idea so I never did. Though the fingerprint reader acts as a power button too so who knows if they've scanned it anyway.

[–] sunzu2@thebrainbin.org 5 points 3 days ago (6 children)

Patterns are too easy to breach via brute force is my understanding like comically easy

[–] wellheh@lemmy.sdf.org 4 points 2 days ago (2 children)

Most phones aren't letting you try more than 5 attempts before you're locked out. You can even set it up to erase after the attempts

[–] catloaf@lemm.ee 6 points 2 days ago

Most attacks are done offline. If they clone the encrypted partition, they can brute-force as fast as they want. Pin lockouts can't protect against that.

[–] sunzu2@thebrainbin.org 2 points 2 days ago (1 children)

You are showing a limited understanding of law enforcement's capabilities for brute force attacks.

They make an imagine ofnthe device and then brute force it so you better have that 16 character password.

[–] wellheh@lemmy.sdf.org 2 points 2 days ago (1 children)

Makes sense, but in that case, why do law enforcement even care if the OS reboots itself if they already have a copy of the encrypted contents?

[–] sunzu2@thebrainbin.org 1 points 2 days ago

properly passworded os still has vulnerabilities that they want to exploit.

OP is just one vulnerability closed.

You mentioned wipe feature after fialed tries, thats a tactic that a person with serious threat model can use but cops go a work around it.

load more comments (3 replies)
load more comments (4 replies)
load more comments (21 replies)