this post was submitted on 10 Nov 2024
36 points (95.0% liked)

Technology

35121 readers
18 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] tias@discuss.tchncs.de 3 points 1 month ago (2 children)

If the phone saves its state before rebooting, why would that help? It will still be accessible after the reboot. What's the attack vector?

[–] chirospasm@lemmy.ml 15 points 1 month ago* (last edited 1 month ago)

Features like this exist for putting the phone back at rest when there hasn't been a successful unlocking for X hours -- GrapheneOS, an Android OS, has a similar feature. The objective is to limit the window of time an attacker has to try to exploit anything the phone may have in operation during a not-at-rest state (when the user is still 'logged in' to the phone, certain background services / features may be available to exploit).

Rebooting automatically, especially if the phone not has not been successfully unlocked recently, may place the phone in a less exploitable state, as those services / features might not be available without logging in first.

[–] Hotzilla@sopuli.xyz 8 points 1 month ago* (last edited 1 month ago) (1 children)

We already know that Israeli cyber company has spyware called pegasus, that can 0-click attacks to ios and Android. It is one time hack, and it is removed on boot. They sell it as service. This is why cyber security centers recommend boot once a day.

https://en.m.wikipedia.org/wiki/Pegasus_(spyware)

[–] davel@lemmy.ml 2 points 1 month ago* (last edited 1 month ago) (1 children)

They had spyware, anyway. We don’t know that it still works.

As of March 2023, Pegasus operators were able to remotely install the spyware on iOS versions through 16.0.3 using a zero-click exploit.

The current version of iOS is 18.1.0.

[–] sunzu2@thebrainbin.org 3 points 1 month ago

We won't know what they have now until it is exposed after usage though.