this post was submitted on 10 Nov 2024
35 points (94.9% liked)

Technology

34877 readers
15 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
top 6 comments
sorted by: hot top controversial new old
[–] dingdongitsabear@lemmy.ml 1 points 3 days ago

anyone knows how to accomplish similar with LineageOS? I had a programmable power off and on timer ona Samsung S3 a long time ago, but that's missing from the current builds.

[–] tias@discuss.tchncs.de 2 points 3 days ago (2 children)

If the phone saves its state before rebooting, why would that help? It will still be accessible after the reboot. What's the attack vector?

[–] chirospasm@lemmy.ml 14 points 3 days ago* (last edited 3 days ago)

Features like this exist for putting the phone back at rest when there hasn't been a successful unlocking for X hours -- GrapheneOS, an Android OS, has a similar feature. The objective is to limit the window of time an attacker has to try to exploit anything the phone may have in operation during a not-at-rest state (when the user is still 'logged in' to the phone, certain background services / features may be available to exploit).

Rebooting automatically, especially if the phone not has not been successfully unlocked recently, may place the phone in a less exploitable state, as those services / features might not be available without logging in first.

[–] Hotzilla@sopuli.xyz 8 points 3 days ago* (last edited 3 days ago) (1 children)

We already know that Israeli cyber company has spyware called pegasus, that can 0-click attacks to ios and Android. It is one time hack, and it is removed on boot. They sell it as service. This is why cyber security centers recommend boot once a day.

https://en.m.wikipedia.org/wiki/Pegasus_(spyware)

[–] davel@lemmy.ml 2 points 3 days ago* (last edited 3 days ago) (1 children)

They had spyware, anyway. We don’t know that it still works.

As of March 2023, Pegasus operators were able to remotely install the spyware on iOS versions through 16.0.3 using a zero-click exploit.

The current version of iOS is 18.1.0.

[–] sunzu2@thebrainbin.org 3 points 3 days ago

We won't know what they have now until it is exposed after usage though.