972

Apple quietly introduced code into iOS 18.1 which reboots the device if it has not been unlocked for a period of time, reverting it to a state which improves the security of iPhones overall and is making it harder for police to break into the devices, according to multiple iPhone security experts. 

On Thursday, 404 Media reported that law enforcement officials were freaking out that iPhones which had been stored for examination were mysteriously rebooting themselves. At the time the cause was unclear, with the officials only able to speculate why they were being locked out of the devices. Now a day later, the potential reason why is coming into view.

“Apple indeed added a feature called ‘inactivity reboot’ in iOS 18.1.,” Dr.-Ing. Jiska Classen, a research group leader at the Hasso Plattner Institute, tweeted after 404 Media published on Thursday along with screenshots that they presented as the relevant pieces of code.

top 50 comments
sorted by: hot top controversial new old
[-] NateNate60@lemmy.world 317 points 9 months ago

Law enforcement shouldn't be able to get into someone's mobile phone without a warrant anyway. All this change does is frustrate attempts by police to evade going through the proper legal procedures and abridging the rights of the accused.

[-] extremeboredom@lemmy.world 122 points 9 months ago

Yep! The police, being fascists, HATE this.

[-] ohellidk@sh.itjust.works 44 points 9 months ago* (last edited 9 months ago)

well it's kind of a selling point. I'm just too used to using android, though.

Edit - there's something for that too, cool!

[-] NikkiDimes@lemmy.world 48 points 9 months ago

You can enable lockdown mode. It forces the next unlock to ignore biometrics and require a pin, which police cannot force you to divulge without a warrant. Once enabled, you get a "lockdown mode" option in the menu when you hold down your power button.

load more comments (1 replies)
[-] Andromxda@lemmy.dbzer0.com 15 points 8 months ago

You can use GrapheneOS, a security-focused version of Android which includes auto-reboot, timers that automatically turn off Wi-Fi and Bluetooth after you don't use them for a certain period of time, a duress PIN/Password that wipes all the data from your device after it's entered, as well as many other incredibly useful features.

It's fully hardened from the ground up, including the Linux kernel, C library, memory allocator, SELinux policies, default firewall rules, and other vital system components.

load more comments (3 replies)
load more comments (3 replies)
load more comments (13 replies)
[-] Zorsith 235 points 9 months ago

IT support everywhere sigh in satisfaction

[-] magnetosphere@fedia.io 95 points 9 months ago

There is no shortage of reasons to dislike Apple. This isn’t one of them.

[-] CosmicTurtle0@lemmy.dbzer0.com 25 points 9 months ago

There is a scene in Mr Robot where Darlene is able to do a full wipe on her phone without even looking at the screen.

I wish I was that good.

I want a way that I can trigger this from the main lock screen without unlocking the phone.

Like a specific pin you have to enter twice to trigger the full wipe.

[-] hydration9806@lemmy.ml 33 points 9 months ago

GrapheneOS has this. I believe it's called a Duress PIN.

load more comments (2 replies)
[-] WhyJiffie@sh.itjust.works 12 points 9 months ago* (last edited 9 months ago)

speaking of that.

this can wipe your phone on a trigger, or lock it with a different code, or send a broadcast message that other apps can act on: Wasted (Lock a device and wipe its data on emergency) https://f-droid.org/packages/me.lucky.wasted/

this reads the screen to see if you have used a special unlock code: Duress (Duress password trigger) https://f-droid.org/packages/me.lucky.duress/

read the app description of both, there's important information

load more comments (5 replies)
load more comments (1 replies)
[-] slaacaa@lemmy.world 16 points 9 months ago* (last edited 8 months ago)

I feel that a lot of the hate for Apple is not fully warranted. Contrary to Google or Facebook, their business model is not built on collecting your personal data. They are extremely overpriced, but deliver good quality - I am using my first iPhone for more than 4 years now, I never had and Android last nearly that long.

load more comments (3 replies)
[-] forest5@lonestarlemmy.mooo.com 71 points 9 months ago

As a member of the intelligence community, I can almost guarantee that this is directed at the increased use of Cellebrite UFED hardware, specifically putting the device back into BFU mode, which removes cryptography-related memory allocations. This is also why you're asked for your password instead of face or fingerprint upon reboot.

[-] phoneymouse@lemmy.world 27 points 9 months ago

I don’t know how Cellebrite is a legally operating company. Their entire business model is a violation of the computer fraud and abuse act.

[-] ilega_dh@feddit.nl 30 points 9 months ago

No that’s only for when poor people do it

[-] Andromxda@lemmy.dbzer0.com 13 points 8 months ago* (last edited 8 months ago)

Cellebrite is developed in Israel, a country that legally shouldn't even exist, and is known for genocide, crime, espionage, manipulation and propaganda, more war crimes, illegal settlements, using their intelligence agency to assassinate political opponents abroad, etc.

The so-called "only democracy in the middle east"

load more comments (1 replies)
load more comments (4 replies)
[-] PresidentCamacho@lemm.ee 16 points 9 months ago

Which is great, because you can't warrant a password.

[-] ziggurat@lemmy.world 14 points 9 months ago

I am also an intelligent individual in a community! High five

load more comments (10 replies)
[-] VantaBrandon@lemmy.world 43 points 9 months ago

Thank you Apple, right side of history here, fuck fascist pigs

[-] serenissi@lemmy.world 41 points 9 months ago

Wouldn't that disrupt the usage of a phone as a server?

[-] Agent641@lemmy.world 132 points 9 months ago
[-] superkret@feddit.org 21 points 9 months ago

oh fuck I can't stop laughing

[-] herrvogel@lemmy.world 13 points 8 months ago

You joke but people do that. I've seen people repurpose their old android phones to host small services on their home networks. I won't comment on how reasonable it is because battery, but it's a thing.

[-] BaroqueInMind@lemmy.one 12 points 8 months ago

Literally no difference between a low power SOC RaspberryPi or a fucking phone which is the same thing with a built-in display.

What exactly is the phone fucking?

load more comments (2 replies)
load more comments (3 replies)
load more comments (2 replies)
load more comments (6 replies)
[-] Buffalox@lemmy.world 47 points 8 months ago

That's it!! Now I will NEVER use an iPhone as a server. 😋

load more comments (5 replies)
[-] finitebanjo@lemmy.world 35 points 8 months ago

On one hand, Fuck Da Police

On the other hand, Fuck Apple

[-] uis@lemm.ee 35 points 9 months ago

Meanwhile security-oriented Android forks: "You didn't do that?"

[-] shortwavesurfer@lemmy.zip 24 points 9 months ago* (last edited 9 months ago)

Actually, Graphene and Calyx have this feature. I believe graphene may have it on by default at 18 hours, but I do not know about Calyx.

load more comments (11 replies)
[-] Teknikal@eviltoast.org 23 points 8 months ago

I think this used to be possible with tasker, ironically though probably not anymore before of all Google's restrictions on Android. (maybe if you have root)

load more comments (3 replies)
[-] tupalos@lemmy.world 13 points 8 months ago

Why does rebooting it improve the safety or security of the phone?

[-] TaviRider@reddthat.com 72 points 8 months ago

When you first boot up a device, most data on that device is encrypted. This is the Before First Unlock (BFU) state. In order to access any of that data, someone must enter the passcode. The Secure Enclave uses it to recreate the decryption keys that allow the device to access that encrypted data. Biometrics like Face ID and Touch ID won’t work: they can’t be used to recreate the encryption keys.

Once you unlock the device by entering the passcode the device generates the encryption keys and uses them to access the data. It keeps those keys in memory. If it didn’t, you’d have to enter your passcode over and over again in order to keep using your device. This is After First Unlock (AFU) state.

When you’re in AFU state and you lock your device, it doesn’t throw away the encryption keys. It just doesn’t permit you to access your device. This is when you can use biometrics to unlock it.

In some jurisdictions a judge can legally force someone to enter biometrics, but can’t force them give up their passcode. This legal distinction in the USA is that giving a passcode is “testimonial” because it requires giving over the contents of your mind, and forcing suspects to do that is not legal in the USA. Biometrics aren’t testimonial, and so someone can be forced to use them, similar to how arrested people are forced to give fingerprints.

Of course, in practical terms this is a meaningless distinction because both biometrics and a passcode can grant access to nearly all data on a device. So one interesting thing about BFU vs AFU is that BFU makes this legal hair-splitting moot: biometrics don’t work in BFU state.

But that’s not what the 404 Media articles are about. It’s more about the forensic tools that can sometimes extract data even from a locked device. A device in AFU state has lots of opportunities for attack compared to BFU. The encryption keys exist, some data is already decrypted in memory, the lightning port is active, it will connect to Wi-Fi networks, and so on. This constitutes a lot of attack surface that hackers could potentially exploit to pull data off the device. In BFU state, there’s very little data available and almost no attack surface. Automatically returning a device to BFU state improves resistance to hacking.

[-] Excrubulent@slrpnk.net 13 points 8 months ago

Fun fact: in Australia we don't have a bill of rights of any kind, so the cops can just force you to reveal your passwords. The maximum penalty for refusing is 2 years imprisonment.

load more comments (5 replies)
load more comments (3 replies)
[-] nicerdicer@feddit.org 37 points 8 months ago

Once rebooted, you need to enter your PIN to unlock the phone (and the SIM as well). Before that it is not possible to unlock the phone with biometric credentials (face ID or fingerprint).

As far as I'm aware, police can force you to hand over your biometric credentials (they can hold the phone to your face to unlock it when you have face ID enabled, or can move your finger to the fingerprint sensor). But they can't force you to reveal the PIN number.

load more comments (2 replies)
[-] Link@rentadrunk.org 13 points 9 months ago* (last edited 7 months ago)

How long until it reboots when inactive?

load more comments (1 replies)
[-] vordalack@lemm.ee 12 points 8 months ago

Do two fucks make a right?

load more comments
view more: next ›
this post was submitted on 09 Nov 2024
972 points (100.0% liked)

Technology

73698 readers
3169 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS