←back to thread

511 points moonsword | 5 comments | | HN request time: 0s | source
Show context
threeseed ◴[] No.42168350[source]
I suspected this was being managed in the Secure Enclave.

That means it's going to be extremely difficult to disable this even if iOS is fully compromised.

replies(1): >>42168578 #
karlgkk ◴[] No.42168578[source]
If I’m reading this right:

Reboot is not enforced by the SEP, though, only requested. It’s a kernel module, which means if a kernel exploit is found, this could be stopped.

However, considering Apple’s excellent track record on these kind of security measures, I would not at all be surprised to find out that a next generation iPhone would involve the SEP forcing a reboot without the kernels involvement.

what this does is that it reduces the window (to three days) of time between when an iOS device is captured, and a usable* kernel exploit is developed.

* there is almost certainly a known kernel exploit out in the wild, but the agencies that have it generally reserve using them until they really need to - or they’re patched. If you have a captured phone used in a, for example, low stakes insurance fraud case, it’s not at all worth revealing your ownership of a kernel exploit.

Once an exploit is “burned”, they distribute them out to agencies and all affected devices are unlocked at once. This now means that kernel exploits must be deployed within three days, and it’s going to preserve the privacy of a lot of people.

replies(6): >>42168622 #>>42168651 #>>42168686 #>>42168793 #>>42168941 #>>42169466 #
toomuchtodo ◴[] No.42168622[source]
Would be nice if Apple would expose an option to set the timer to a shorter window, but still great work.
replies(3): >>42168670 #>>42168683 #>>42168816 #
jojobas ◴[] No.42168670[source]
Or to disable it entirely. Someone could set up and ipad to do something always plugged in, would be bloody annoying to have it locked cold every three days.
replies(4): >>42168688 #>>42168692 #>>42168904 #>>42168980 #
grahamj ◴[] No.42168692{3}[source]
Conspiracy theory time! Apple puts this out there to break iPad-based DIY home control panels because they're about to release a product that would compete with them.
replies(3): >>42168814 #>>42168949 #>>42168970 #
1. duskwuff ◴[] No.42168970{4}[source]
> Apple puts this out there to break iPad-based DIY home control panels

If you were using an iPad as a home control panel, you'd probably disable the passcode on it entirely - and I believe that'd disable the inactivity reboot as well.

replies(2): >>42169263 #>>42177638 #
2. aspenmayer ◴[] No.42169263[source]
You could also set the auto-lock in display settings to never.
replies(1): >>42177639 #
3. grahamj ◴[] No.42177638[source]
I dunno, does this SEP check only happen when the device is locked? I don’t recall that being mentioned.
replies(1): >>42180390 #
4. grahamj ◴[] No.42177639[source]
I dunno, does this SEP check only happen when the device is locked? I don’t recall that being mentioned.
5. duskwuff ◴[] No.42180390[source]
I can't imagine how "time since last unlock" would even work for a device with no passcode, since the user never explicitly unlocks the device. Besides, a reboot wouldn't do anything useful in that configuration; with no passcode, user data is always accessible.