this post was submitted on 31 May 2024
397 points (97.8% liked)

Technology

58137 readers
4359 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 376 points 3 months ago* (last edited 3 months ago) (31 children)

You do it because it makes an attacker’s life harder because now I have to find two bugs instead of one.

The entire boot chain of the phone up to the apps you run are verified successively by the component that loads it. A digital signature helps ensure that only trustworthy code ever runs. A bug must be found to bypass these checks to load malware code. For example, a bug in the image code in a web browser might cause loading of code that isn’t checked. This way the malware gets smuggled onto the phone.

This means that if you get hacked via one bug and malware is loaded, the attacker has to work harder to solve the problem of how do I convince the phone to load it again at boot because the code it’s made of isn’t going to be approved code. When you reboot, you are effectively forcing a validation that all the code you have running is authentic, which would exclude the malware. Trick me once sure, can you survive a full pat down? Probably not. It’ll get caught.

Unless I have a second bug to fool the normal code loading systems too, the malware can’t run. You have to go back and trigger the first bug again somehow, which places more strain on the attacker.

[–] [email protected] 119 points 3 months ago (1 children)

Thanks for taking the time to write that out. I found it really helpful.👍

[–] [email protected] 71 points 3 months ago (4 children)

I love to talk about computer security. I don’t get the chance often enough.

[–] [email protected] 31 points 3 months ago (1 children)

I hope you get more chances to do so; you explained the situation in a much better way than the article and convinced me to reboot my phone.

[–] [email protected] 11 points 3 months ago* (last edited 3 months ago)

You restart your phone because of security.

I 'restart' my phone, because it's overheated and lost its battery % to 0.

We're not the same.

[–] [email protected] 7 points 3 months ago (1 children)

Thank you, friend. You've convinced me to restart my phone.

[–] [email protected] 3 points 3 months ago* (last edited 3 months ago)

Personally, I restart mine maybe once a week. No need to go crazy with it, but it helps make life harder for bad actors and might make your phone run better.

[–] [email protected] 4 points 3 months ago* (last edited 3 months ago) (1 children)

I hope to hear you* on Darknet Diaries hahaha

[–] [email protected] 4 points 3 months ago

I can’t blatantly associate this account with other identities but I’ll say that I’ll be at DEFCON32 sniffing the air and shaking hands on the Wild Wild West of the open LAN.

I insert a lie or two about real life details every now and then to mitigate profiling. But the gist of what I write is always me.

[–] [email protected] 2 points 3 months ago

If you have a blog where you talk about that, I would like to read it.

load more comments (29 replies)