this post was submitted on 09 Nov 2024
979 points (98.3% liked)

Technology

60105 readers
2418 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
 

Apple quietly introduced code into iOS 18.1 which reboots the device if it has not been unlocked for a period of time, reverting it to a state which improves the security of iPhones overall and is making it harder for police to break into the devices, according to multiple iPhone security experts. 

On Thursday, 404 Media reported that law enforcement officials were freaking out that iPhones which had been stored for examination were mysteriously rebooting themselves. At the time the cause was unclear, with the officials only able to speculate why they were being locked out of the devices. Now a day later, the potential reason why is coming into view.

“Apple indeed added a feature called ‘inactivity reboot’ in iOS 18.1.,” Dr.-Ing. Jiska Classen, a research group leader at the Hasso Plattner Institute, tweeted after 404 Media published on Thursday along with screenshots that they presented as the relevant pieces of code.

you are viewing a single comment's thread
view the rest of the comments
[–] NateNate60@lemmy.world 318 points 1 month ago (4 children)

Law enforcement shouldn't be able to get into someone's mobile phone without a warrant anyway. All this change does is frustrate attempts by police to evade going through the proper legal procedures and abridging the rights of the accused.

[–] extremeboredom@lemmy.world 120 points 1 month ago

Yep! The police, being fascists, HATE this.

[–] ohellidk@sh.itjust.works 44 points 1 month ago* (last edited 1 month ago) (4 children)

well it's kind of a selling point. I'm just too used to using android, though.

Edit - there's something for that too, cool!

[–] NikkiDimes@lemmy.world 50 points 1 month ago (2 children)

You can enable lockdown mode. It forces the next unlock to ignore biometrics and require a pin, which police cannot force you to divulge without a warrant. Once enabled, you get a "lockdown mode" option in the menu when you hold down your power button.

[–] gamermanh@lemmy.dbzer0.com 21 points 1 month ago (2 children)

If you haven't done this and need the same ability IMMEDIATELY: reboot, or just shut down

Every first boot requires pin same as lockdown

Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that, then theyre likely to fail to get that to work should you not manage to lock it down beforehand

Finally: there are apps that let you use alternate codes/finger unlocks to wipe/encrypt/reboot the device instead, allowing you to pretend to cooperate with the cops up until they realize they got played

[–] Crashumbc@lemmy.world 9 points 1 month ago (4 children)

IANAL, but I'd be very careful about wiping the phone like that. Sounds a lot like destruction of evidence...

[–] gamermanh@lemmy.dbzer0.com 26 points 1 month ago (1 children)

Gotta prove there was evidence on the phone in the first place, which would take forensic work to do and be not worth the work in the majority of cases

Plus it would annoy them, and that's the real goal here

[–] AceFuzzLord@lemm.ee 5 points 1 month ago

I imagine that would be one hell of a story to tell Bubba when they decide to lock you away for whatever false charges they can pin on you.

[–] sunzu2@thebrainbin.org 7 points 1 month ago

When the cops are about to fuck you like this... Defending yourself is the priority lol wtf clown take is this.

[–] noxy@yiffit.net 3 points 1 month ago

sounds like the point

[–] echodot@feddit.uk 0 points 1 month ago (1 children)

It's not destruction of evidence though because without a warrant the information on the phone isn't evidence, it's just stuff on a phone. Stuff which is your stuff and you have every right to delete it whenever you want.

They would actually have to arrest you and acquire a warrant, try it to getting you to unlock the phone for it to be "evidence".

The police would have a very hard time in court saying that there was evidence on the phone when they can't produce any documentation to indicate they had any reason to believe this to be the case. Think about the exchange with the judge.

"Your honor this individual wiped their phone, thus destroying evidence"

"Very well, may I see the warrant?"

"Yeah... Er... Well about that..."

It doesn't matter what the police may think you have done, if they don't go via the process the case will be dismissed on a technicality. They hate doing that but they don't really have a choice.

[–] where_am_i@sh.itjust.works 0 points 1 month ago (1 children)

So many words to explain how you literally have no clue about how the law works.

[–] echodot@feddit.uk 2 points 1 month ago

In what way am I wrong then?

[–] EndlessNightmare@reddthat.com 2 points 1 month ago

Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that

I actually do this. 3 wrong attempts and the phone requires a password.

I consider it a very light measure and not something to rely on alone, but it's a bit of a no-brainer for how easy and unobtrusive this is.

[–] Andromxda@lemmy.dbzer0.com 10 points 1 month ago

Although lockdown mode is a good step and helps defend against biometric warrents, it does not wipe the encryption keys from RAM. This can only be achieved by using a secondary (non-default) user profile on GrapheneOS, and triggering the End session feature. This fully removes the cryptographic secrets from memory, and requires the PIN or password to unlock, which is enforced through the StrongBox and Weaver API of the Titan M2 secure element in Pixel devices.

[–] Andromxda@lemmy.dbzer0.com 16 points 1 month ago (1 children)

You can use GrapheneOS, a security-focused version of Android which includes auto-reboot, timers that automatically turn off Wi-Fi and Bluetooth after you don't use them for a certain period of time, a duress PIN/Password that wipes all the data from your device after it's entered, as well as many other incredibly useful features.

It's fully hardened from the ground up, including the Linux kernel, C library, memory allocator, SELinux policies, default firewall rules, and other vital system components.

[–] discount_door_garlic@lemmy.world 6 points 1 month ago (1 children)

graphene is ONLY for select Google pixel phones though. I wish this was made much clearer by the team and advocates.

its a real shame because pixels, although big in the USA are typically a minority of most android ecosystems elsewhere, and bootloader hijinks keep some perfectly capable phones from being easy to switch over to, even if they were supported.

Even on samsungs, which are much better for flashing than they used to be - my options on a year old flagship for a decent ROM are pathetic compared to the old days.

so I would really love to use graphene, and go back to an open source ROM without crap on it, but pixels are such a bottom tier phone for their price in a lot of places, as much as I really really want the project go gain traction for their transparency and objectives.

[–] Andromxda@lemmy.dbzer0.com 1 points 1 month ago (1 children)

but pixels are such a bottom tier phone for their price in a lot of places

Not sure what you mean, you can get a used Pixel 6a for 120 EUR, which will continue to get updates for another 2.5 years. Show me another phone with such a great value proposition. There's a website that calculates how much each Pixel would cost you monthly (it's basically just price divided by update lifetime): https://pixel-pricing.netlify.app/

There are some really good deals, and I'd rather pay a little more for a phone that can actually be used privately, instead of buying some cheap Chinese, spyware-infested garbage that will fall apart after 2 years, and never gets any security updates.

Not sure what you mean, you can get a used Pixel 6a for 120 EUR, which will continue to get updates for another 2.5 years. Show me another phone with such a great value proposition. That's exactly my point, outside of the EU and north america, you're just very unlikely to find that scenario. I don't want to doxx myself here, but the going rate for the phone you mentioned is at minimum 300 euro equivalent - comparable flagships significantly cheaper. I have nothing against Pixels specifically - before the re-brand, I had nearly every Google Nexus phone ever made, and they were all amazing. They're just not acceptably priced in all markets for what they are, even used.

I'd argue however that there's much more to android than either Pixels OR chinese spyware crap - Samsung, Sony, and LG aren't always perfect, but often make very good products that if running a custom ROM, are every bit as secure as any pixel, while the hardware of pixels is generally a bit worse, but compensated for with better software optimisation. Buying into a false dichotomy that there is only one good android manufacturer puts us no further ahead than apple fanboys beholden to a largely good, but sometimes flawed ecosystem.

My ideal is that development can expand to other mainstream brands and OEMs, and that the interest in the graphene/ROM community picks up steam more broadly, rather than being siloed into pixels alone, and bound to the fate of google-specific hardware going forward.

[–] ContrarianTrail@lemm.ee 7 points 1 month ago (2 children)

I'm the only guy in my (small) friend group who still used pattern code instead of fingerprint so I take that to mean my phone is by default more difficult to break into than most. Giving my fingerprint to a giantic tech firm has always seemed like a bad idea so I never did. Though the fingerprint reader acts as a power button too so who knows if they've scanned it anyway.

[–] Damage@feddit.it 16 points 1 month ago

Afaik the fingerprint is stored on dedicated hardware on your device, it never leaves your phone and cannot be "read"

[–] sunzu2@thebrainbin.org 5 points 1 month ago (2 children)

Patterns are too easy to breach via brute force is my understanding like comically easy

[–] Crashumbc@lemmy.world 8 points 1 month ago* (last edited 1 month ago)

Any modern phone os locks to pin after 3 tries.

Now depending how good they are, it's often possible to guess it by looking at the smear patterns on the phone.

[–] wellheh@lemmy.sdf.org 4 points 1 month ago (2 children)

Most phones aren't letting you try more than 5 attempts before you're locked out. You can even set it up to erase after the attempts

[–] catloaf@lemm.ee 6 points 1 month ago

Most attacks are done offline. If they clone the encrypted partition, they can brute-force as fast as they want. Pin lockouts can't protect against that.

[–] sunzu2@thebrainbin.org 2 points 1 month ago (1 children)

You are showing a limited understanding of law enforcement's capabilities for brute force attacks.

They make an imagine ofnthe device and then brute force it so you better have that 16 character password.

[–] wellheh@lemmy.sdf.org 2 points 1 month ago (1 children)

Makes sense, but in that case, why do law enforcement even care if the OS reboots itself if they already have a copy of the encrypted contents?

[–] sunzu2@thebrainbin.org 1 points 1 month ago

properly passworded os still has vulnerabilities that they want to exploit.

OP is just one vulnerability closed.

You mentioned wipe feature after fialed tries, thats a tactic that a person with serious threat model can use but cops go a work around it.

[–] BaroqueInMind@lemmy.one 3 points 1 month ago

All current stock Samsung phones can do this too, BTW.