Apple quietly introduced code into iOS 18.1 which reboots the device if it has not been unlocked for a period of time, reverting it to a state which improves the security of iPhones overall and is making it harder for police to break into the devices, according to multiple iPhone security experts.

On Thursday, 404 Media reported that law enforcement officials were freaking out that iPhones which had been stored for examination were mysteriously rebooting themselves. At the time the cause was unclear, with the officials only able to speculate why they were being locked out of the devices. Now a day later, the potential reason why is coming into view.

“Apple indeed added a feature called ‘inactivity reboot’ in iOS 18.1.,” Dr.-Ing. Jiska Classen, a research group leader at the Hasso Plattner Institute, tweeted after 404 Media published on Thursday along with screenshots that they presented as the relevant pieces of code.

  • NateNate60@lemmy.world
    link
    fedilink
    English
    arrow-up
    320
    arrow-down
    1
    ·
    13 days ago

    Law enforcement shouldn’t be able to get into someone’s mobile phone without a warrant anyway. All this change does is frustrate attempts by police to evade going through the proper legal procedures and abridging the rights of the accused.

    • ohellidk@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      45
      arrow-down
      1
      ·
      edit-2
      13 days ago

      well it’s kind of a selling point. I’m just too used to using android, though.

      Edit - there’s something for that too, cool!

      • NιƙƙιDιɱҽʂ@lemmy.world
        link
        fedilink
        English
        arrow-up
        51
        ·
        13 days ago

        You can enable lockdown mode. It forces the next unlock to ignore biometrics and require a pin, which police cannot force you to divulge without a warrant. Once enabled, you get a “lockdown mode” option in the menu when you hold down your power button.

        • gamermanh@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          22
          ·
          13 days ago

          If you haven’t done this and need the same ability IMMEDIATELY: reboot, or just shut down

          Every first boot requires pin same as lockdown

          Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that, then theyre likely to fail to get that to work should you not manage to lock it down beforehand

          Finally: there are apps that let you use alternate codes/finger unlocks to wipe/encrypt/reboot the device instead, allowing you to pretend to cooperate with the cops up until they realize they got played

          • Crashumbc@lemmy.world
            link
            fedilink
            English
            arrow-up
            12
            arrow-down
            3
            ·
            13 days ago

            IANAL, but I’d be very careful about wiping the phone like that. Sounds a lot like destruction of evidence…

            • gamermanh@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              27
              arrow-down
              1
              ·
              13 days ago

              Gotta prove there was evidence on the phone in the first place, which would take forensic work to do and be not worth the work in the majority of cases

              Plus it would annoy them, and that’s the real goal here

              • Dizzy Devil Ducky@lemm.ee
                link
                fedilink
                English
                arrow-up
                6
                arrow-down
                1
                ·
                13 days ago

                I imagine that would be one hell of a story to tell Bubba when they decide to lock you away for whatever false charges they can pin on you.

            • sunzu2@thebrainbin.org
              link
              fedilink
              arrow-up
              12
              arrow-down
              5
              ·
              13 days ago

              When the cops are about to fuck you like this… Defending yourself is the priority lol wtf clown take is this.

            • Echo Dot@feddit.uk
              link
              fedilink
              English
              arrow-up
              8
              arrow-down
              8
              ·
              13 days ago

              It’s not destruction of evidence though because without a warrant the information on the phone isn’t evidence, it’s just stuff on a phone. Stuff which is your stuff and you have every right to delete it whenever you want.

              They would actually have to arrest you and acquire a warrant, try it to getting you to unlock the phone for it to be “evidence”.

              The police would have a very hard time in court saying that there was evidence on the phone when they can’t produce any documentation to indicate they had any reason to believe this to be the case. Think about the exchange with the judge.

              “Your honor this individual wiped their phone, thus destroying evidence”

              “Very well, may I see the warrant?”

              “Yeah… Er… Well about that…”

              It doesn’t matter what the police may think you have done, if they don’t go via the process the case will be dismissed on a technicality. They hate doing that but they don’t really have a choice.

          • EndlessNightmare@reddthat.com
            link
            fedilink
            English
            arrow-up
            2
            ·
            12 days ago

            Also: set a nonstandard finger in a weird way as your finger unlock if you wanna use that

            I actually do this. 3 wrong attempts and the phone requires a password.

            I consider it a very light measure and not something to rely on alone, but it’s a bit of a no-brainer for how easy and unobtrusive this is.

        • Andromxda 🇺🇦🇵🇸🇹🇼@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          10
          ·
          12 days ago

          Although lockdown mode is a good step and helps defend against biometric warrents, it does not wipe the encryption keys from RAM. This can only be achieved by using a secondary (non-default) user profile on GrapheneOS, and triggering the End session feature. This fully removes the cryptographic secrets from memory, and requires the PIN or password to unlock, which is enforced through the StrongBox and Weaver API of the Titan M2 secure element in Pixel devices.

      • Andromxda 🇺🇦🇵🇸🇹🇼@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        16
        ·
        12 days ago

        You can use GrapheneOS, a security-focused version of Android which includes auto-reboot, timers that automatically turn off Wi-Fi and Bluetooth after you don’t use them for a certain period of time, a duress PIN/Password that wipes all the data from your device after it’s entered, as well as many other incredibly useful features.

        It’s fully hardened from the ground up, including the Linux kernel, C library, memory allocator, SELinux policies, default firewall rules, and other vital system components.

        • discount_door_garlic@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          12 days ago

          graphene is ONLY for select Google pixel phones though. I wish this was made much clearer by the team and advocates.

          its a real shame because pixels, although big in the USA are typically a minority of most android ecosystems elsewhere, and bootloader hijinks keep some perfectly capable phones from being easy to switch over to, even if they were supported.

          Even on samsungs, which are much better for flashing than they used to be - my options on a year old flagship for a decent ROM are pathetic compared to the old days.

          so I would really love to use graphene, and go back to an open source ROM without crap on it, but pixels are such a bottom tier phone for their price in a lot of places, as much as I really really want the project go gain traction for their transparency and objectives.

          • but pixels are such a bottom tier phone for their price in a lot of places

            Not sure what you mean, you can get a used Pixel 6a for 120 EUR, which will continue to get updates for another 2.5 years. Show me another phone with such a great value proposition. There’s a website that calculates how much each Pixel would cost you monthly (it’s basically just price divided by update lifetime): https://pixel-pricing.netlify.app/

            There are some really good deals, and I’d rather pay a little more for a phone that can actually be used privately, instead of buying some cheap Chinese, spyware-infested garbage that will fall apart after 2 years, and never gets any security updates.

            • discount_door_garlic@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              11 days ago

              Not sure what you mean, you can get a used Pixel 6a for 120 EUR, which will continue to get updates for another 2.5 years. Show me another phone with such a great value proposition. That’s exactly my point, outside of the EU and north america, you’re just very unlikely to find that scenario. I don’t want to doxx myself here, but the going rate for the phone you mentioned is at minimum 300 euro equivalent - comparable flagships significantly cheaper. I have nothing against Pixels specifically - before the re-brand, I had nearly every Google Nexus phone ever made, and they were all amazing. They’re just not acceptably priced in all markets for what they are, even used.

              I’d argue however that there’s much more to android than either Pixels OR chinese spyware crap - Samsung, Sony, and LG aren’t always perfect, but often make very good products that if running a custom ROM, are every bit as secure as any pixel, while the hardware of pixels is generally a bit worse, but compensated for with better software optimisation. Buying into a false dichotomy that there is only one good android manufacturer puts us no further ahead than apple fanboys beholden to a largely good, but sometimes flawed ecosystem.

              My ideal is that development can expand to other mainstream brands and OEMs, and that the interest in the graphene/ROM community picks up steam more broadly, rather than being siloed into pixels alone, and bound to the fate of google-specific hardware going forward.

      • ContrarianTrail@lemm.ee
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        1
        ·
        13 days ago

        I’m the only guy in my (small) friend group who still used pattern code instead of fingerprint so I take that to mean my phone is by default more difficult to break into than most. Giving my fingerprint to a giantic tech firm has always seemed like a bad idea so I never did. Though the fingerprint reader acts as a power button too so who knows if they’ve scanned it anyway.

        • Damage@feddit.it
          link
          fedilink
          English
          arrow-up
          16
          ·
          13 days ago

          Afaik the fingerprint is stored on dedicated hardware on your device, it never leaves your phone and cannot be “read”

          • Crashumbc@lemmy.world
            link
            fedilink
            English
            arrow-up
            8
            ·
            edit-2
            13 days ago

            Any modern phone os locks to pin after 3 tries.

            Now depending how good they are, it’s often possible to guess it by looking at the smear patterns on the phone.

          • wellheh@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            4
            ·
            13 days ago

            Most phones aren’t letting you try more than 5 attempts before you’re locked out. You can even set it up to erase after the attempts

            • catloaf@lemm.ee
              link
              fedilink
              English
              arrow-up
              7
              arrow-down
              1
              ·
              12 days ago

              Most attacks are done offline. If they clone the encrypted partition, they can brute-force as fast as they want. Pin lockouts can’t protect against that.

            • sunzu2@thebrainbin.org
              link
              fedilink
              arrow-up
              3
              arrow-down
              1
              ·
              12 days ago

              You are showing a limited understanding of law enforcement’s capabilities for brute force attacks.

              They make an imagine ofnthe device and then brute force it so you better have that 16 character password.

              • wellheh@lemmy.sdf.org
                link
                fedilink
                English
                arrow-up
                2
                ·
                12 days ago

                Makes sense, but in that case, why do law enforcement even care if the OS reboots itself if they already have a copy of the encrypted contents?

                • sunzu2@thebrainbin.org
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  12 days ago

                  properly passworded os still has vulnerabilities that they want to exploit.

                  OP is just one vulnerability closed.

                  You mentioned wipe feature after fialed tries, thats a tactic that a person with serious threat model can use but cops go a work around it.

    • rottingleaf@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      15
      ·
      13 days ago

      Well, when you confiscate a piece of paper, even without a warrant to read it you can do that physically when it’s in your possession, and it’s part of the evidence or something, so everyone else can too, so why even fight for that detail.

      They just pretended it’s fine with mobile computers.

      I thought that “fruit of a poisonous tree” is a real principle, not just for books about Perry Mason. /s

      So - yes. It’s just really hard to trust Apple.

      • catloaf@lemm.ee
        link
        fedilink
        English
        arrow-up
        20
        ·
        13 days ago

        To confiscate anything, unless it’s lying openly, you need a warrant.

        If a cop sees an unlocked phone with evidence of a crime on it, that doesn’t need a warrant. If it’s locked and they only have the suspicion of evidence, they need a warrant. Same as with entering a building or drilling a safe.

        • rottingleaf@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          5
          ·
          13 days ago

          Is analogy with people in (very quiet) places who don’t lock doors to their homes correct? Then it’s as if the door is not locked, a cop doesn’t have to ask permission (or warrant)?

          • catloaf@lemm.ee
            link
            fedilink
            English
            arrow-up
            14
            arrow-down
            1
            ·
            edit-2
            13 days ago

            No. Even if a house is unlocked, the fourth amendment guarantees “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures”.

            What constitutes “unreasonable”, is of course, up to a judge.

            If a cop can look in your window from the porch and see a meth lab, yeah, they’re going to come back with a warrant, mostly because they can’t just pick up the house and take it to evidence. If your phone is lying unlocked, and they see something obviously criminal on the screen, they’re going to take it right then and there.

              • asret@lemmy.zip
                link
                fedilink
                English
                arrow-up
                3
                ·
                12 days ago

                Seems like he’s saying they are. If they see something criminal on the phone then it’s not an unreasonable seizure.

      • PresidentCamacho@lemm.ee
        link
        fedilink
        English
        arrow-up
        16
        arrow-down
        1
        ·
        13 days ago

        That argument sounds great until you consider that a piece of paper won’t contain almost the entirety of your personal information, web traffic, location history, communications. You may say you could find most of that pre computer era in someone’s house, but guess what you would need to get inside and find those pieces of paper…

      • just_another_person@lemmy.world
        link
        fedilink
        English
        arrow-up
        44
        arrow-down
        1
        ·
        13 days ago

        Lawyer. Not true.

        Example: An officer pulls someone over and suspects them of something arrestable. Then says “Do you want me to get your personal belongings from your car?”

        Any person agreeing to this allows them to hold your phone as evidence indefinitely in the US now.

        • NotMyOldRedditName@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          3
          ·
          edit-2
          13 days ago

          That’s all lawful.

          They can search you and the area when arrested. They can search the car if they have probable cause that evidence will be in the vehicle

          I said have a warrant or seized lawfully, not nust have a warrant.

          Edit: I didn’t even write what I said I said correctly. Corrected it lol.

          • NιƙƙιDιɱҽʂ@lemmy.world
            link
            fedilink
            English
            arrow-up
            16
            ·
            13 days ago

            Seized or not, they can not force you to unlock your phone via pin without a warrant. They can only force you to use biometrics.

            • NotMyOldRedditName@lemmy.world
              link
              fedilink
              English
              arrow-up
              6
              arrow-down
              2
              ·
              13 days ago

              Right, but this is about them bypassing you entirely.

              They don’t need your fingerprint or pass code if they can bypass it themselves. This feature protects you when they’ve seized it lawfully which can be for many reasons.

              • catloaf@lemm.ee
                link
                fedilink
                English
                arrow-up
                9
                ·
                13 days ago

                Or even if they’ve seized it unlawfully. Or if it’s been stolen by a regular thief, a cybercriminal, the mafia, or a cartel.

                • NotMyOldRedditName@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  13 days ago

                  I’m not sure how much it would actually help for a regular thief.

                  This is about protecting it against more sophisticated attacks. But the rest probably have those means if wanted.

            • just_another_person@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              arrow-down
              1
              ·
              13 days ago

              Other people answered, but to your point, in some cases THEY CAN compel without a court order.

              Biometrics don’t conform to certain laws, and it gets even more complicated if you’re entering the US through customs. They can practically hold you indefinitely if you don’t comply. Whether you have legal representation is sort of an after thought.

      • NateNate60@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        12 days ago

        The police can engage in rubber-hose cryptanalysis. In many countries, it’s legal to keep a suspect in prison indefinitely until they comply with a warrant requiring them to divulge encryption keys. And that’s not to mention the countries where they’ll do more than keep you in a decently-clean cell with three meals a day to, ahem, encourage you to divulge the password.

        • NotMyOldRedditName@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          12 days ago

          That’s what you need distress codes for.

          Destruction of evidence is a much different crime.

          I would suspect it’d no longer be legal to hold them indefinitely and instead at best get the max prison sentence for that crime instead.

          A us law website says that’s no more than 20y as the absolute max, and getting max would probably be hard if they don’t have anything else on you.

          You’d have to weigh that against what’s on the device.

          Also, even better if the distress code nukes the bad content, and then has a real 2nd profile that looks real, which makes it even harder to prove you used a distress code.

          • NateNate60@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            11 days ago

            In most cases, destroying evidence will result in an adverse inference being drawn against the accused. It means that the court will assume that the evidence was incriminating which is why you destroyed it.