this post was submitted on 09 Aug 2023
38 points (100.0% liked)

United Kingdom

4036 readers
192 users here now

General community for news/discussion in the UK.

Less serious posts should go in [email protected] or [email protected]
More serious politics should go in [email protected].

Try not to spam the same link to multiple feddit.uk communities.
Pick the most appropriate, and put it there.

Posts should be related to UK-centric news, and should be either a link to a reputable source, or a text post on this community.

Opinion pieces are also allowed, provided they are not misleading/misrepresented/drivel, and have proper sources.

If you think "reputable news source" needs some definition, by all means start a meta thread.

Posts should be manually submitted, not by bot. Link titles should not be editorialised.

Disappointing comments will generally be left to fester in ratio, outright horrible comments will be removed.
Message the mods if you feel something really should be removed, or if a user seems to have a pattern of awful comments.

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 year ago (4 children)

I would be curious to learn more, as this is a much touted security feature. If it's that easy to bypass then we need to understand the limitations.

Do you have any more information on this?

[–] [email protected] 2 points 1 year ago (1 children)

Not an expert in any way, but I would assume it is similar to having physical access to a computer. You would not be able to get into the existing device or retrieve data, but if you have stolen it and just to use the device, there are numerous tools to allow side loading of new blobs, that will bypass any restrictions.

[–] [email protected] 3 points 1 year ago

In theory this is true, in practice the protections Apple puts in place tend to put even games consoles to shame. That plus the quick turnaround of iPhone hardware means by the time it is cracked, it was already obselete

[–] [email protected] 2 points 1 year ago (2 children)

The usual tactic is to send a phishing text to a number that calls it pretending to be Apple. They then get your Apple ID credentials and use that to unlock the device.

[–] [email protected] 2 points 1 year ago (1 children)

How do you send a phishing text to a phone you have stolen? The owner would either not get the text, or get it via iMessage which the response wouldn't appear on the stolen phone. I'm not following this tactic, so I'm obviously missing something.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (1 children)

The owner tries to call the number from another phone, usually a mobile. The hope is that the phone was misplaced and not stolen.

[–] [email protected] 2 points 1 year ago (1 children)

So the owner calls the phone, which is answered by the thief who pretends to be Apple?

Interesting.

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago)

They don't necessarily have to answer. They can just note the number that appears on-screen and text it later from a different device.

Usually the next step for the owner is to try get into their Apple ID to access the lost phone functions. That's where the texts come in.

[–] [email protected] 1 points 1 year ago (1 children)

As usual, people are the weakest link in security.

[–] [email protected] 1 points 1 year ago (1 children)

Exactly. The protections on the iPhone themselves are actually very strong for the time the phone released in. Unless you've got NSA-level hardware hackers in your org, this is by far your best bet.

[–] [email protected] 1 points 1 year ago (1 children)

Very much depends on your threat model. An iPhone is great if you trust Apple with the backdoor to your phone, if not then you're probably much more secure with GrapheneOS.

[–] [email protected] 2 points 1 year ago

I mean yeah, obviously Apple isn't going to be able protect you much against a state-sponsored threat with their own private list of zero days, or Apple itself, but right now that's a small amount of people either are truly interested in fucking over.

[–] [email protected] 2 points 1 year ago

This is the first article I found (so I don't know how reliable the software is) but one suggestion is a tool that seems like it just jailbreaks the iPhone and can then remove the lock. So basically find an exploit that allows you to get round the protection.