Apple quietly introduced code into iOS 18.1 which reboots the device if it has not been unlocked for a period of time, reverting it to a state which improves the security of iPhones overall and is making it harder for police to break into the devices, according to multiple iPhone security experts.

On Thursday, 404 Media reported that law enforcement officials were freaking out that iPhones which had been stored for examination were mysteriously rebooting themselves. At the time the cause was unclear, with the officials only able to speculate why they were being locked out of the devices. Now a day later, the potential reason why is coming into view.

“Apple indeed added a feature called ‘inactivity reboot’ in iOS 18.1.,” Dr.-Ing. Jiska Classen, a research group leader at the Hasso Plattner Institute, tweeted after 404 Media published on Thursday along with screenshots that they presented as the relevant pieces of code.

  • ohellidk@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    45
    arrow-down
    1
    ·
    edit-2
    5 days ago

    well it’s kind of a selling point. I’m just too used to using android, though.

    Edit - there’s something for that too, cool!

    • NιƙƙιDιɱҽʂ@lemmy.world
      link
      fedilink
      English
      arrow-up
      51
      ·
      5 days ago

      You can enable lockdown mode. It forces the next unlock to ignore biometrics and require a pin, which police cannot force you to divulge without a warrant. Once enabled, you get a “lockdown mode” option in the menu when you hold down your power button.

      • gamermanh@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        22
        ·
        5 days ago

        If you haven’t done this and need the same ability IMMEDIATELY: reboot, or just shut down

        Every first boot requires pin same as lockdown

        Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that, then theyre likely to fail to get that to work should you not manage to lock it down beforehand

        Finally: there are apps that let you use alternate codes/finger unlocks to wipe/encrypt/reboot the device instead, allowing you to pretend to cooperate with the cops up until they realize they got played

        • Crashumbc@lemmy.world
          link
          fedilink
          English
          arrow-up
          12
          arrow-down
          3
          ·
          5 days ago

          IANAL, but I’d be very careful about wiping the phone like that. Sounds a lot like destruction of evidence…

          • gamermanh@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            27
            arrow-down
            1
            ·
            5 days ago

            Gotta prove there was evidence on the phone in the first place, which would take forensic work to do and be not worth the work in the majority of cases

            Plus it would annoy them, and that’s the real goal here

            • Dizzy Devil Ducky@lemm.ee
              link
              fedilink
              English
              arrow-up
              6
              arrow-down
              1
              ·
              5 days ago

              I imagine that would be one hell of a story to tell Bubba when they decide to lock you away for whatever false charges they can pin on you.

          • sunzu2@thebrainbin.org
            link
            fedilink
            arrow-up
            12
            arrow-down
            5
            ·
            5 days ago

            When the cops are about to fuck you like this… Defending yourself is the priority lol wtf clown take is this.

          • Echo Dot@feddit.uk
            link
            fedilink
            English
            arrow-up
            8
            arrow-down
            8
            ·
            4 days ago

            It’s not destruction of evidence though because without a warrant the information on the phone isn’t evidence, it’s just stuff on a phone. Stuff which is your stuff and you have every right to delete it whenever you want.

            They would actually have to arrest you and acquire a warrant, try it to getting you to unlock the phone for it to be “evidence”.

            The police would have a very hard time in court saying that there was evidence on the phone when they can’t produce any documentation to indicate they had any reason to believe this to be the case. Think about the exchange with the judge.

            “Your honor this individual wiped their phone, thus destroying evidence”

            “Very well, may I see the warrant?”

            “Yeah… Er… Well about that…”

            It doesn’t matter what the police may think you have done, if they don’t go via the process the case will be dismissed on a technicality. They hate doing that but they don’t really have a choice.

        • EndlessNightmare@reddthat.com
          link
          fedilink
          English
          arrow-up
          2
          ·
          4 days ago

          Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that

          I actually do this. 3 wrong attempts and the phone requires a password.

          I consider it a very light measure and not something to rely on alone, but it’s a bit of a no-brainer for how easy and unobtrusive this is.

      • Although lockdown mode is a good step and helps defend against biometric warrents, it does not wipe the encryption keys from RAM. This can only be achieved by using a secondary (non-default) user profile on GrapheneOS, and triggering the End session feature. This fully removes the cryptographic secrets from memory, and requires the PIN or password to unlock, which is enforced through the StrongBox and Weaver API of the Titan M2 secure element in Pixel devices.

    • You can use GrapheneOS, a security-focused version of Android which includes auto-reboot, timers that automatically turn off Wi-Fi and Bluetooth after you don’t use them for a certain period of time, a duress PIN/Password that wipes all the data from your device after it’s entered, as well as many other incredibly useful features.

      It’s fully hardened from the ground up, including the Linux kernel, C library, memory allocator, SELinux policies, default firewall rules, and other vital system components.

      • discount_door_garlic@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        4 days ago

        graphene is ONLY for select Google pixel phones though. I wish this was made much clearer by the team and advocates.

        its a real shame because pixels, although big in the USA are typically a minority of most android ecosystems elsewhere, and bootloader hijinks keep some perfectly capable phones from being easy to switch over to, even if they were supported.

        Even on samsungs, which are much better for flashing than they used to be - my options on a year old flagship for a decent ROM are pathetic compared to the old days.

        so I would really love to use graphene, and go back to an open source ROM without crap on it, but pixels are such a bottom tier phone for their price in a lot of places, as much as I really really want the project go gain traction for their transparency and objectives.

        • but pixels are such a bottom tier phone for their price in a lot of places

          Not sure what you mean, you can get a used Pixel 6a for 120 EUR, which will continue to get updates for another 2.5 years. Show me another phone with such a great value proposition. There’s a website that calculates how much each Pixel would cost you monthly (it’s basically just price divided by update lifetime): https://pixel-pricing.netlify.app/

          There are some really good deals, and I’d rather pay a little more for a phone that can actually be used privately, instead of buying some cheap Chinese, spyware-infested garbage that will fall apart after 2 years, and never gets any security updates.

          • discount_door_garlic@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 days ago

            Not sure what you mean, you can get a used Pixel 6a for 120 EUR, which will continue to get updates for another 2.5 years. Show me another phone with such a great value proposition. That’s exactly my point, outside of the EU and north america, you’re just very unlikely to find that scenario. I don’t want to doxx myself here, but the going rate for the phone you mentioned is at minimum 300 euro equivalent - comparable flagships significantly cheaper. I have nothing against Pixels specifically - before the re-brand, I had nearly every Google Nexus phone ever made, and they were all amazing. They’re just not acceptably priced in all markets for what they are, even used.

            I’d argue however that there’s much more to android than either Pixels OR chinese spyware crap - Samsung, Sony, and LG aren’t always perfect, but often make very good products that if running a custom ROM, are every bit as secure as any pixel, while the hardware of pixels is generally a bit worse, but compensated for with better software optimisation. Buying into a false dichotomy that there is only one good android manufacturer puts us no further ahead than apple fanboys beholden to a largely good, but sometimes flawed ecosystem.

            My ideal is that development can expand to other mainstream brands and OEMs, and that the interest in the graphene/ROM community picks up steam more broadly, rather than being siloed into pixels alone, and bound to the fate of google-specific hardware going forward.

    • ContrarianTrail@lemm.ee
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      5 days ago

      I’m the only guy in my (small) friend group who still used pattern code instead of fingerprint so I take that to mean my phone is by default more difficult to break into than most. Giving my fingerprint to a giantic tech firm has always seemed like a bad idea so I never did. Though the fingerprint reader acts as a power button too so who knows if they’ve scanned it anyway.

      • Damage@feddit.it
        link
        fedilink
        English
        arrow-up
        16
        ·
        4 days ago

        Afaik the fingerprint is stored on dedicated hardware on your device, it never leaves your phone and cannot be “read”

        • Crashumbc@lemmy.world
          link
          fedilink
          English
          arrow-up
          8
          ·
          edit-2
          5 days ago

          Any modern phone os locks to pin after 3 tries.

          Now depending how good they are, it’s often possible to guess it by looking at the smear patterns on the phone.

        • wellheh@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          4
          ·
          4 days ago

          Most phones aren’t letting you try more than 5 attempts before you’re locked out. You can even set it up to erase after the attempts

          • catloaf@lemm.ee
            link
            fedilink
            English
            arrow-up
            7
            arrow-down
            1
            ·
            4 days ago

            Most attacks are done offline. If they clone the encrypted partition, they can brute-force as fast as they want. Pin lockouts can’t protect against that.

          • sunzu2@thebrainbin.org
            link
            fedilink
            arrow-up
            3
            arrow-down
            1
            ·
            4 days ago

            You are showing a limited understanding of law enforcement’s capabilities for brute force attacks.

            They make an imagine ofnthe device and then brute force it so you better have that 16 character password.

            • wellheh@lemmy.sdf.org
              link
              fedilink
              English
              arrow-up
              2
              ·
              4 days ago

              Makes sense, but in that case, why do law enforcement even care if the OS reboots itself if they already have a copy of the encrypted contents?

              • sunzu2@thebrainbin.org
                link
                fedilink
                arrow-up
                1
                ·
                4 days ago

                properly passworded os still has vulnerabilities that they want to exploit.

                OP is just one vulnerability closed.

                You mentioned wipe feature after fialed tries, thats a tactic that a person with serious threat model can use but cops go a work around it.