915

Apple quietly introduced code into iOS 18.1 which reboots the device if it has not been unlocked for a period of time, reverting it to a state which improves the security of iPhones overall and is making it harder for police to break into the devices, according to multiple iPhone security experts. 

On Thursday, 404 Media reported that law enforcement officials were freaking out that iPhones which had been stored for examination were mysteriously rebooting themselves. At the time the cause was unclear, with the officials only able to speculate why they were being locked out of the devices. Now a day later, the potential reason why is coming into view.

“Apple indeed added a feature called ‘inactivity reboot’ in iOS 18.1.,” Dr.-Ing. Jiska Classen, a research group leader at the Hasso Plattner Institute, tweeted after 404 Media published on Thursday along with screenshots that they presented as the relevant pieces of code.

you are viewing a single comment's thread
view the rest of the comments
[-] NateNate60@lemmy.world 301 points 6 days ago

Law enforcement shouldn't be able to get into someone's mobile phone without a warrant anyway. All this change does is frustrate attempts by police to evade going through the proper legal procedures and abridging the rights of the accused.

[-] extremeboredom@lemmy.world 113 points 6 days ago

Yep! The police, being fascists, HATE this.

[-] ohellidk@sh.itjust.works 41 points 6 days ago* (last edited 6 days ago)

well it's kind of a selling point. I'm just too used to using android, though.

Edit - there's something for that too, cool!

[-] NikkiDimes@lemmy.world 48 points 6 days ago

You can enable lockdown mode. It forces the next unlock to ignore biometrics and require a pin, which police cannot force you to divulge without a warrant. Once enabled, you get a "lockdown mode" option in the menu when you hold down your power button.

[-] gamermanh@lemmy.dbzer0.com 21 points 6 days ago

If you haven't done this and need the same ability IMMEDIATELY: reboot, or just shut down

Every first boot requires pin same as lockdown

Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that, then theyre likely to fail to get that to work should you not manage to lock it down beforehand

Finally: there are apps that let you use alternate codes/finger unlocks to wipe/encrypt/reboot the device instead, allowing you to pretend to cooperate with the cops up until they realize they got played

[-] Crashumbc@lemmy.world 9 points 6 days ago

IANAL, but I'd be very careful about wiping the phone like that. Sounds a lot like destruction of evidence...

[-] gamermanh@lemmy.dbzer0.com 24 points 6 days ago

Gotta prove there was evidence on the phone in the first place, which would take forensic work to do and be not worth the work in the majority of cases

Plus it would annoy them, and that's the real goal here

[-] AceFuzzLord@lemm.ee 3 points 6 days ago

I imagine that would be one hell of a story to tell Bubba when they decide to lock you away for whatever false charges they can pin on you.

[-] sunzu2@thebrainbin.org 6 points 6 days ago

When the cops are about to fuck you like this... Defending yourself is the priority lol wtf clown take is this.

[-] noxy@yiffit.net 2 points 5 days ago

sounds like the point

[-] echodot@feddit.uk -1 points 6 days ago

It's not destruction of evidence though because without a warrant the information on the phone isn't evidence, it's just stuff on a phone. Stuff which is your stuff and you have every right to delete it whenever you want.

They would actually have to arrest you and acquire a warrant, try it to getting you to unlock the phone for it to be "evidence".

The police would have a very hard time in court saying that there was evidence on the phone when they can't produce any documentation to indicate they had any reason to believe this to be the case. Think about the exchange with the judge.

"Your honor this individual wiped their phone, thus destroying evidence"

"Very well, may I see the warrant?"

"Yeah... Er... Well about that..."

It doesn't matter what the police may think you have done, if they don't go via the process the case will be dismissed on a technicality. They hate doing that but they don't really have a choice.

[-] where_am_i@sh.itjust.works 2 points 5 days ago

So many words to explain how you literally have no clue about how the law works.

[-] echodot@feddit.uk 1 points 5 days ago

In what way am I wrong then?

[-] EndlessNightmare@reddthat.com 1 points 5 days ago

Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that

I actually do this. 3 wrong attempts and the phone requires a password.

I consider it a very light measure and not something to rely on alone, but it's a bit of a no-brainer for how easy and unobtrusive this is.

[-] Andromxda@lemmy.dbzer0.com 8 points 5 days ago

Although lockdown mode is a good step and helps defend against biometric warrents, it does not wipe the encryption keys from RAM. This can only be achieved by using a secondary (non-default) user profile on GrapheneOS, and triggering the End session feature. This fully removes the cryptographic secrets from memory, and requires the PIN or password to unlock, which is enforced through the StrongBox and Weaver API of the Titan M2 secure element in Pixel devices.

[-] Andromxda@lemmy.dbzer0.com 13 points 5 days ago

You can use GrapheneOS, a security-focused version of Android which includes auto-reboot, timers that automatically turn off Wi-Fi and Bluetooth after you don't use them for a certain period of time, a duress PIN/Password that wipes all the data from your device after it's entered, as well as many other incredibly useful features.

It's fully hardened from the ground up, including the Linux kernel, C library, memory allocator, SELinux policies, default firewall rules, and other vital system components.

graphene is ONLY for select Google pixel phones though. I wish this was made much clearer by the team and advocates.

its a real shame because pixels, although big in the USA are typically a minority of most android ecosystems elsewhere, and bootloader hijinks keep some perfectly capable phones from being easy to switch over to, even if they were supported.

Even on samsungs, which are much better for flashing than they used to be - my options on a year old flagship for a decent ROM are pathetic compared to the old days.

so I would really love to use graphene, and go back to an open source ROM without crap on it, but pixels are such a bottom tier phone for their price in a lot of places, as much as I really really want the project go gain traction for their transparency and objectives.

[-] ContrarianTrail@lemm.ee 6 points 6 days ago

I'm the only guy in my (small) friend group who still used pattern code instead of fingerprint so I take that to mean my phone is by default more difficult to break into than most. Giving my fingerprint to a giantic tech firm has always seemed like a bad idea so I never did. Though the fingerprint reader acts as a power button too so who knows if they've scanned it anyway.

[-] Damage@feddit.it 13 points 5 days ago

Afaik the fingerprint is stored on dedicated hardware on your device, it never leaves your phone and cannot be "read"

[-] sunzu2@thebrainbin.org 4 points 6 days ago

Patterns are too easy to breach via brute force is my understanding like comically easy

[-] Crashumbc@lemmy.world 7 points 6 days ago* (last edited 6 days ago)

Any modern phone os locks to pin after 3 tries.

Now depending how good they are, it's often possible to guess it by looking at the smear patterns on the phone.

[-] wellheh@lemmy.sdf.org 3 points 5 days ago

Most phones aren't letting you try more than 5 attempts before you're locked out. You can even set it up to erase after the attempts

[-] catloaf@lemm.ee 6 points 5 days ago

Most attacks are done offline. If they clone the encrypted partition, they can brute-force as fast as they want. Pin lockouts can't protect against that.

[-] sunzu2@thebrainbin.org 2 points 5 days ago

You are showing a limited understanding of law enforcement's capabilities for brute force attacks.

They make an imagine ofnthe device and then brute force it so you better have that 16 character password.

[-] wellheh@lemmy.sdf.org 1 points 5 days ago

Makes sense, but in that case, why do law enforcement even care if the OS reboots itself if they already have a copy of the encrypted contents?

[-] sunzu2@thebrainbin.org 1 points 5 days ago

properly passworded os still has vulnerabilities that they want to exploit.

OP is just one vulnerability closed.

You mentioned wipe feature after fialed tries, thats a tactic that a person with serious threat model can use but cops go a work around it.

[-] BaroqueInMind@lemmy.one 2 points 5 days ago

All current stock Samsung phones can do this too, BTW.

[-] rottingleaf@lemmy.world -5 points 6 days ago

Well, when you confiscate a piece of paper, even without a warrant to read it you can do that physically when it's in your possession, and it's part of the evidence or something, so everyone else can too, so why even fight for that detail.

They just pretended it's fine with mobile computers.

I thought that "fruit of a poisonous tree" is a real principle, not just for books about Perry Mason. /s

So - yes. It's just really hard to trust Apple.

[-] catloaf@lemm.ee 19 points 6 days ago

To confiscate anything, unless it's lying openly, you need a warrant.

If a cop sees an unlocked phone with evidence of a crime on it, that doesn't need a warrant. If it's locked and they only have the suspicion of evidence, they need a warrant. Same as with entering a building or drilling a safe.

[-] rottingleaf@lemmy.world -4 points 6 days ago

Is analogy with people in (very quiet) places who don't lock doors to their homes correct? Then it's as if the door is not locked, a cop doesn't have to ask permission (or warrant)?

[-] catloaf@lemm.ee 13 points 6 days ago* (last edited 6 days ago)

No. Even if a house is unlocked, the fourth amendment guarantees "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures".

What constitutes "unreasonable", is of course, up to a judge.

If a cop can look in your window from the porch and see a meth lab, yeah, they're going to come back with a warrant, mostly because they can't just pick up the house and take it to evidence. If your phone is lying unlocked, and they see something obviously criminal on the screen, they're going to take it right then and there.

[-] rottingleaf@lemmy.world -2 points 6 days ago

That's what I meant. Phones should be treated similarly to houses.

[-] asret@lemmy.zip 1 points 5 days ago

Seems like he's saying they are. If they see something criminal on the phone then it's not an unreasonable seizure.

[-] PresidentCamacho@lemm.ee 12 points 6 days ago

That argument sounds great until you consider that a piece of paper won't contain almost the entirety of your personal information, web traffic, location history, communications. You may say you could find most of that pre computer era in someone's house, but guess what you would need to get inside and find those pieces of paper...

[-] rottingleaf@lemmy.world 0 points 6 days ago

It's not an argument, just a thought.

this post was submitted on 09 Nov 2024
915 points (98.2% liked)

Technology

59366 readers
2098 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS