this post was submitted on 08 Nov 2024
244 points (93.9% liked)

Technology

59312 readers
4528 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 101 points 5 days ago (8 children)

If this is indeed a security feature I'm about to buy my first iPhone.

[–] [email protected] 142 points 5 days ago (6 children)

CalyxOS and GrapheneOS have this as a feature.

[–] [email protected] 31 points 5 days ago* (last edited 5 days ago) (1 children)

Two hours seems extremely low.

[–] [email protected] 45 points 5 days ago (1 children)

On grapheneos it's a setting, 18 hours by default I believe, but adjustable from 10 minutes to 72 hours.

[–] [email protected] 16 points 5 days ago

That seems much more reasonable. Thanks for the info.

[–] [email protected] 36 points 5 days ago (5 children)

Wouldn't this make your phone reboot all night while you're sleeping?

[–] [email protected] 73 points 5 days ago

It will only reboot once unless it is unlocked again https://grapheneos.org/features#auto-reboot

[–] [email protected] 27 points 5 days ago

Just set the time too longer than you would be asleep. So in this screenshot above you could set it to 18 hours and most people at least that I know do not go 18 hours without unlocking their phone at least one time which would then reset the timer.

[–] [email protected] 9 points 5 days ago (1 children)

Yes. Alternatively, you can just.. power it off.

[–] [email protected] 10 points 4 days ago (3 children)

I keep mine on in case of family emergencies, it's also my alarm clock

load more comments (3 replies)
load more comments (2 replies)
load more comments (4 replies)
[–] [email protected] 72 points 5 days ago (7 children)

Don't switch to a privacy-violating platform just for a feature found in open source operating systems.

https://grapheneos.org/features#auto-reboot

[–] [email protected] 11 points 5 days ago

Oh yeah, see they've done it perfectly by having it based on the last time you unlocked your screen.

load more comments (6 replies)
[–] [email protected] 15 points 4 days ago

Android has it as well. It's customizable, too.

[–] [email protected] 12 points 5 days ago (7 children)

It should be, but it appears to be a bug.

load more comments (7 replies)
load more comments (3 replies)
[–] [email protected] 64 points 5 days ago* (last edited 5 days ago) (2 children)

Android has an app that you can install that auto wipes a phone after X amount of time if the phone hasnt been unlocked:

https://f-droid.org/en/packages/me.lucky.wasted/

Also theres an app that allows you to set a fake password that wipes the phone:

https://f-droid.org/en/packages/me.lucky.duress/

All open source, I have tested these apps on my phones, they work great. The second app about the duress password is a bit glitchy and didnt work on some of my phones.

Disclaimer: I am not a lawyer and setting your phone to automatically wipe itself may be considered destruction of evidence in a court of law.

[–] [email protected] 4 points 4 days ago (1 children)

Thanks but I literally cannot figure out how to use these apps after installing

load more comments (1 replies)
[–] [email protected] 5 points 4 days ago (1 children)

Nice, I think making your phone go into Before First Unlock mode cannot be considered destruction of evidence

[–] [email protected] 5 points 4 days ago* (last edited 4 days ago) (7 children)

Well they might charge you with "Obstruction of Justice" instead. Then plug it in some cellebrite device and boom, unlocked.

Best way to not have to deal with stuff like this is just to not have the incriminating evidence in the first place. If you are, for example, doing a protest, only chat with contacts in a safe place, then wipe chat logs every time, any data you wish to keep should be encrypted then uploaded anonymously via VPN/Tor and wiped from local storage. Hide the fact that such data exists so you wouldn't have a scenario where the government is trying to get you to give them the data, since they dont even know what data exists. Plausable deniability.

Edit: Those apps I've linked is still a good idea since "Destruction of Evidence" is probably a lesser charge than something like "Rioting".

[–] [email protected] 1 points 2 days ago (1 children)

Cellebrite struggles with iPhones already, this reboot is part of the cat and mouse game they’re playing

[–] [email protected] 1 points 2 days ago (1 children)

That's what they say. I mean the news literally base this off the FBI's own words, so there's no way for us to tell if they actually manage to break the encryption but then turns around that say "the encryption is too strong". Besides, iOS is closed source.

Intelligence agencies have made this "Anom Phone" that is this supposed encrypted phone that drug dealers and various criminals used to communicate, turned out to be a honeypot.

[–] [email protected] 1 points 2 days ago* (last edited 2 days ago) (1 children)

I’ve used cellebrite before.

Anecdote of 1 for you, iOS is a pain in the ass.

[–] [email protected] 1 points 2 days ago (1 children)

There are different versions.

One is where they sell the cellebrite device to law enforcement.

Another where the cellebrite device remain in control of cellebrite, and law enforcement has to send the phone to cellebrite.

Unless you actually work for cellebrite and got access to their more advanced tools, which then I doubt they would let you share the details of since that must be breaking some non-disclosure agreement.

[–] [email protected] 1 points 2 days ago* (last edited 2 days ago)

Yes, I am well aware.

shipping a phone to them or waiting for the tech to arrive, that transit time, is what my mind went to immediately when this feature was introduced.

The phones are significantly more difficult to get into after the reboot.

I’m disclosing absolutely nothing.

load more comments (6 replies)
[–] [email protected] 41 points 5 days ago* (last edited 5 days ago)

Anything to make their job harder is perfectly okay by me. The only thing that would be needed would be for this to be a feature and to have a cool down period of like 48 hours where the phone would reboot twice in that time so that if it was held it would still reboot itself.

Edit: Even better idea. Turning off the feature requires a reboot.

[–] [email protected] 26 points 5 days ago (8 children)

Note to those wishing for such a function, it’s possible by creating an iOS Shortcut - New Shortcut > Shutdown > Change it to ‘Restart’.

From there, you create an automation in Shortcuts to run based on time, location, etc.

[–] [email protected] 8 points 5 days ago (1 children)

Alas, it asks if you want to restart.

[–] [email protected] 7 points 5 days ago

You could always take 10 seconds and invoke the operating system's hard shutdown command if you have the 10 seconds to spare. On Android at least, that's pressing and holding power and volume up for 10 seconds. But I do not know what it would be on the iPhone.

load more comments (7 replies)
[–] [email protected] 23 points 5 days ago (1 children)

this is the police we're talking about, they probably just forgot to charge them and are trying to shift the blame

[–] [email protected] 13 points 5 days ago

Whatever it is, incompetence, bug, or feature, I love it.

[–] [email protected] 2 points 3 days ago (1 children)

Speculation is that ios 18 is communicating with other phones while locked to determine security. This can more likely be a NSA/US empire backdoor than a user protection feature. Lowly police systems are just not on the "hacker list". One way the backdoor could work is that if a "NSA/Mossad list phone" is present, protect the other phones, unless the phones are in an NSA/Mossad secure facility.

[–] [email protected] 3 points 2 days ago (1 children)

Or it could just be using the inactivity reboot feature that was recently added to iOS.

[–] [email protected] 0 points 2 days ago (1 children)

ok. I'd suspect spy agency back doors if the feature was unannounced. If it was an announced feature, then that is reasonable explanation.

[–] [email protected] 2 points 2 days ago* (last edited 2 days ago) (1 children)

It’s literally a documented feature AND it’s weird super secret spy agency shit is the easiest answer for you tbh.

[–] [email protected] 0 points 2 days ago (1 children)

I thanked you for explanation. OP did not suggest that as an explanation.

[–] [email protected] 2 points 2 days ago

You did though. Lmao

[–] [email protected] 15 points 5 days ago (1 children)

Hot take: this is actually a bug not a feature.

[–] [email protected] 14 points 5 days ago

Which is the saddest part, honestly. If it was a feature, that would be fantastic news. And especially if it had a cooldown feature of like 48 hours, where it would reboot twice in that timeframe, so that if a cop turned off the setting, while it was in their possession, it wouldn't matter because it would reboot anyway.

[–] [email protected] 12 points 5 days ago (2 children)

Someone said it in another thread yesterday, baseband memory leak. The firmware for that shit is terrible, I've had to deal with it in the past.

load more comments (2 replies)
[–] [email protected] 9 points 5 days ago

"new security feature" "warning"

🙂

load more comments
view more: next ›