Top
Best
New

Posted by robin_reala 2 days ago

FBI couldn't get into WaPo reporter's iPhone because Lockdown Mode enabled(www.404media.co)
598 points | 527 comments
bwoah 2 days ago|
https://archive.is/1ILVS
nova22033 2 days ago||
Remember...they can make you use touch id...they can't make you give them your password.

https://x.com/runasand/status/2017659019251343763?s=20

The FBI was able to access Washington Post reporter Hannah Natanson's Signal messages because she used Signal on her work laptop. The laptop accepted Touch ID for authentication, meaning the agents were allowed to require her to unlock it.

wackget 2 days ago||
Link which doesn't directly support website owned by unscrupulous trillionaire: https://xcancel.com/runasand/status/2017659019251343763?s=20
throwawayfour 2 days ago|||
Good reminder to also set up something that does this automatically for you:

https://news.ycombinator.com/item?id=46526010

JimA 2 days ago||
I generally avoid extensions that can read all sites (even if technically necessary), so use the suggestion found here [1] instead.

A few bookmarklets:

javascript:(function(){if (location.host.endsWith('x.com')) location.host='xcancel.com';})()

javascript:(function(){if (location.host.endsWith('youtube.com')) location.host='inv.nadeko.net';})()

javascript:(function(){if (location.hostname.endsWith('instagram.com')) {location.replace('https://imginn.com' + location.pathname);}})()

[1] https://www.reddit.com/r/uBlockOrigin/comments/1cc0uon/addin...

Alive-in-2025 2 days ago||
Wow, where did these come from. these are great alternatives, especially the youtube. I like using the duck player but that's only in that browser.

For example duck://player/fqtK3s7PE_k where the video id in youtube url https://www.youtube.com/watch?v=fqtK3s7PE_k

But it doesn't have that overview page like inv.nadeko.net does

forgotTheLast 2 days ago||||
I actually think it is fitting to read about a government agency weaponized by an unscrupulous billionaire going after journalists working for an unscrupulous billionaire on an unscrupulous trillionaire owned platform.
apparent 2 days ago||||
There are trillionaires?
alpinisme 2 days ago||
I guess technically musk rounds to a trillion. 852B acc to Forbes
apparent 1 day ago||
That would be some aggressive rounding.
alpinisme 1 day ago|||
Yes and no. Obviously it’s unusual rounding or I wouldn’t have said “I guess technically,” but rounding is all about domains and relevant precision. To be honest, when someone says “billionaires” I don’t assume that the number 1,000,000 is a meaningful hard cut off. I assume we’re talking about the ones who are three orders of magnitude up from “millionaire” and orders of magnitude work by rounding from .5.
dragonwriter 1 day ago||
> orders of magnitude work by rounding from .5.

No, orders of magnitude are exponential, not linear, so conventionally “on the order of 1 billion” would be between 100 million × sqrt(10) and 1 billion × sqrt(10), but “billionaire” isn't “net worth on the order of 1 billion” but “net worth of 1 billion or more”, or, when used heirarchically alongside trillionaire ans millionaire “net worth of at least one billion and less than one trillion”.

antonvs 1 day ago|||
What's $148,000,000,000 between friends
asadm 2 days ago|||
[flagged]
pyrophane 2 days ago|||
Maybe. I don't think we yet have a good understanding of how many deaths he will have caused as a result of DOGE so abruptly cutting off assistance to so many vulnerable people around the world, but I've heard estimates hover around 600,000.

Assuming that number turns out to be close to reality, how do you weigh so many unnecessary deaths against VTL rockets and the electric cars?

Perhaps a practitioner of Effective Altruism could better answer that question.

C6JEsQeQa5fCjE 2 days ago|||
> I don't think we yet have a good understanding of how many deaths he will have caused as a result of DOGE so abruptly cutting off assistance to so many vulnerable people around the world

Nor how many deaths will be caused by his support for far right parties across Europe, when they start ethnic cleansings.

asadm 2 days ago||||
[flagged]
roboror 2 days ago|||
I've seen corruption in the police. Government. Hospitals. Do you support immediately shuttering those offices with no replacements?
sejje 2 days ago|||
They could at least just get funded by their own government.
abustamam 2 days ago|||
There is corruption everywhere. But do you deny that these organizations by-and-large provided aid and therefore saves the lives of folks who may have otherwise died from illness?

This doesn't make corruption OK. But he tore out a lifeline for some people without giving them an alternative way to get aid.

asadm 2 days ago||
[flagged]
NoMoreNicksLeft 2 days ago|||
[flagged]
ceejayoz 2 days ago|||
> The US taxpayer has no moral obligation to send welfare "around the world".

Sure. It's a transactional purchase of stability and goodwill, via which the US has benefited enormously.

asadm 2 days ago||||
Correct. But also, it's a bandaid (and a really ineffective one ie. 99% lossy) on real issues of that world.
mptest 2 days ago|||
> The US taxpayer has no moral obligation to send welfare "around the world".

I mean, by way of the atrocities we've committed around the world, we kinda do.

Even if we buy your thesis, foregoing morals, geopolitics, and history, it's a useful soft power strategy...

I'm not saying fund USAID before healthcare for all in america. I'm saying of all the insane things our government wastes money on, USAID was far down on the list of most egregious.

NoMoreNicksLeft 1 day ago||
>I mean, by way of the atrocities we've committed around the world, we kinda do.

I've committed no atrocities. Going to guess that you've committed no atrocities. What atrocities did occur, most of those who committed those are dead, the rest are senile in nursing homes. I have no guilt and certainly feel no guilt for those events.

>it's a useful soft power strategy.

Sure, if you're some sort of tyrant. I thought the left was against colonialism... but you guys really just one a more clever, subtle colonialism eh? Figures.

>I'm saying of all the insane things our government wastes money on, USAID was far down on the list of most egregious.

What you're saying is that no cuts can or should be made, unless they are your favorite cuts first. And maybe after you get those, no others need be made at all.

Dylan16807 2 days ago||||
Even if his total contribution is positive, his current contribution is quite bad. And most of that bad has been tied directly to x.
asadm 2 days ago||
I can atleast still voice against Israeli genocide there. I am good for now.
frereubu 2 days ago|||
How many people do you think see those tweets, how many minds do you think you have changed, and at what mental cost to yourself?
asadm 2 days ago|||
I see other's tweets. I don't think most are being shadowbanned. I am doing fine myself and pretty productive actually.
crumpled 2 days ago|||
What's the point of these questions? Seems like, "what's the point of dissent if the cards are stacked against you?"
ebbi 2 days ago|||
He was begging to go party with someone that spent time in prison for child exploitation.

That in itself should make you hate the dude.

asadm 2 days ago|||
Yup. Hate him as person. But he is still net positive with his scientific/engineering contributions, is he not?

Wasn't Edison an asshole?

Snoots 1 day ago|||
Maybe, but I personally don't believe whatever engineering contributions (money?) he made outweigh the regressions he's caused elsewhere. I think the world would be better off without him.
ebbi 2 days ago|||
Dunno, I'd rather have unabused kids than the technological breakthroughs he has contributed to. Anyone being giddy to meet with a convicted pedo is very sus in my books, and deserves no respect, regardless of their prior contributions.

Children were exploited, and we're doing this net positive analysis on whether he should face the scorn. I'm not having a go at you - it's just frustrating to see very little happening after so much has been exposed, and I think part of it comes from this mindset - 'oh he's a good guy, this is a mistake/misstep' while people that were exploited as children can't even get their justice.

It's sickening.

JumpCrisscross 2 days ago||
> I'd rather have unabused kids than the technological breakthroughs he has contributed to

I'd rather have both. Hawthorne doesn't get nuked if Elon Musk goes to jail.

> Children were exploited

Abuse. Exploitation. CSAM. We're mushing words.

Child rape. These men raped children. Others not only stayed silent in full knowledge of it, but supported it directly and indirectly. More than that, they arrogantly assumed–and, by remaining in the United States, continue to assume–that they're going to get away with it.

Which category is Elon Musk in? We don't know. Most of the people in the Epstein files are innocent. But almost all of them seem to have been fine with (a) partying with an indicted and unrepentant pedophile [1] and (b) not saying for decades–and again, today–anything to the cops about a hive of child rape.

A lot of them should go to jail. All of them should be investigated. And almost all of them need to be retired from public life.

[1] https://web.archive.org/web/20220224113217/https://www.theda...

TylerLives 2 days ago||
[flagged]
JumpCrisscross 2 days ago||
Direct? No. That he was indicted for it? Yes [1].

(Clarification: I’m using the term colloquially. Whether Epstein had a mental condition is unclear.)

[1] https://www.justice.gov/usao-sdny/press-release/file/1180481...

TylerLives 2 days ago||
Unless I missed something, that's not pedophilia.
DaSHacka 2 days ago|||
That widely-circulated ""email"" of Musk's was fake lol

Don't believe me? Go to the epstein emails and try to find it

andwhatisthis 2 days ago||||
How so?
asadm 2 days ago||
nasa is fucked up. spacex is US’s only shot.
alistairSH 2 days ago|||
[flagged]
b8 2 days ago|||
They can hold you in contempt for 18 months for not giving your password, https://arstechnica.com/tech-policy/2020/02/man-who-refused-....
ElevenLathe 2 days ago|||
Being held in contempt at least means you got a day in court first. A judge telling me to give up my password is different than a dozen armed, masked secret police telling me to.
C6JEsQeQa5fCjE 2 days ago||
> A judge telling me to give up my password is different than a dozen armed, masked secret police telling me to.

Yes, a judge is unlikely to order your execution if you refuse. Based on recent pattern of their behavior, masked secret police who are living their wildest authoritarian dreams are likely to execute you if you anger them (for example by refusing to comply with their desires).

qingcharles 2 days ago||
I don't practically see it happen, but you have to be careful once you are in a jail though, because there are often few limits on what the administration of the jail can do to you for any supposed violation of the jail rules (which they can legally make up on a whim, and due process is extremely limited). In Illinois, at least, a county Sheriff has unlimited power to punish a detainee in any extreme way they can imagine for even the very slightest infraction. There are no laws (statutes) which define what a "crime" is inside jail and what the punishment for it is. If it wasn't for SCOTUS limiting the death penalty to certain levels of behavior (e.g. murder) then a sheriff would be able to simply legally execute a detainee for pretty much anything.
noident 2 days ago|||
That's a very unusual and narrow exception involving "foregone conclusion doctrine", an important fact missed by Ars Technica but elaborated on by AP: https://apnews.com/general-news-49da3a1e71f74e1c98012611aedc...
OGWhales 2 days ago||
> Authorities, citing a “foregone conclusion exception” to the Fifth Amendment, argued that Rawls could not invoke his right to self-incrimination because police already had evidence of a crime. The 3rd Circuit panel agreed, upholding a lower court decision.

I do not follow the logic here, what does that even mean? It seems very dubious. And what happens if one legitimately forgets? They just get to keep you there forever?

DannyBee 2 days ago|||
Lawyer here - let me try to help.

This is an area that seems to confuse a lot of people because of what the 5th amendment says and doesn't say.

The reason they can't force you to unlock your phone is not because your phone contains evidence of stuff. They have a warrant to get that evidence. You do not have a right to prevent them from getting it just because it's yours. Most evidence is self-incriminating in this way - if you have a murder weapon in your pocket with blood on it, and the police lawfully stop you and take it, you really are incriminating yourself in one sense by giving it to them, but not in the 5th amendment sense.

The right against self-incrimination is mostly about being forced to give testimonial evidence against yourself. That is, it's mostly about you being forced to testify against yourself under oath, or otherwise give evidence that is testimonial in nature against yourself. In the case of passwords, courts often view it now as you being forced to disclose the contents of your mind (IE live testify against yourself) and equally important, even if not live testimony against yourself, it testimonially proves that you have access to the phone (more on this in a second). Biometrics are a weird state, with some courts finding it like passwords/pins, and some finding it just a physical fact with no testimonial component at all other than proving your ability to access.

The foregone conclusion part comes into play because, excluding being forced to disclose the contents of your mind for a second, the testimonial evidence you are being forced to give when you unlock a phone is that you have access to the phone. If they can already prove it's your phone or that you have access to it, then unlocking it does not matter from a testimonial standpoint, and courts will often require you to do so in the jurisdictions that don't consider any other part of unlocking to be testimonial. (Similarly, if they can't prove you have access to the phone, and whether you have access to the phone or not matters to the case in a material way, they generally will not be able to force you to unlock it or try to unlock it because it woudl be a 5th amendment violation).

Hope this helps.

antonvs 1 day ago||
> excluding being forced to disclose the contents of your mind for a second

This seems like a key point though. What's the legal distinction between compelling someone to unlock a phone using information in their mind, and compelling them to speak what's in their mind?

If I had incriminating info on my phone at one point, and I memorized it and then deleted it from the phone, now that information is legally protected from being accessed. So it just matters whether the information itself is in your mind, vs. the ability to access it?

DannyBee 1 day ago||
There are practical differences - phones store a lot more information that you will keep in your mind at once.

You can actually eliminate phones entirely from your second example.

If you had incriminating info on paper at one point, and memorized it and deleted it, it would now be legally protected from being accessed.

One reason society is okay with this is because most people can't memorize vast troves of information.

Otherwise, the view here would probably change.

These rules exist to serve various goals as best they can. If they no longer serve those goals well, because of technology or whatever else, the rules will change. Being completely logical and self-consistent is not one of these goals, nor would it make sense as a primary goal for rules meant to try to balance societal vs personal rights.

This is, for various reasons, often frustrating to the average HN'er :)

antonvs 10 hours ago||
> This is, for various reasons, often frustrating to the average HN'er :)

With that in mind...

> Being completely logical and self-consistent is not one of these goals, nor would it make sense as a primary goal for rules meant to try to balance societal vs personal rights.

Do we really know that it wouldn't make sense, or is that just an assumption because the existing system doesn't do it? (Alternatively, perhaps a consistent logical theory simply hasn't been identified and articulated.)

This reminds me of how "sovereign citizens" argue their position. Their logic isn't consistent, it’s built around rhetorical escape hatches. They'll claim that their vehicle is registered with the federal DOT, which is a commercial registration, but then they'll also claim to be a non-commercial "traveler". They're optimizing for coverage of objections, not global consistency.

What you seem to be telling me is that the prevailing legal system is the same, just perhaps with more of the obvious rough edges smoothed out over the centuries.

brb, going to try encoding the USC in Rocq.

direwolf20 2 days ago||||
And why do they need to unlock your phone if they already proved you did the crime?
halJordan 2 days ago||||
It means that if all the other evidence shows that the desired evidence is on the computer, then it is not a question of whether it exists, so youre not really searching for something. Youre retrieving it. That doesn't implicate the 4th amendment.
DannyBee 2 days ago||
Unlocking/forced unlocking is not a 4th amendment issue, but a 5th amendment one.

The 4th amendment would protect you from them seizing your phone in the first place for no good reason, but would not protect you from them seizing your phone if they believe it has evidence of a crime.

Regardless, it is not the thing that protects you (or doesn't, depending) from having to give or otherwise type in your passcode/pin/fingerprint/etc.

seanw444 2 days ago|||
You're delusional. When ICE starts executing people on the spot for not giving up iPhone passwords, I'll eat my words.
OGWhales 2 days ago||
???
seanw444 1 day ago||
I don't think that was the comment I was originally trying to reply to. Strange.
teejmya 2 days ago|||
I previously commented a solution to another problem, but it assists here too:

https://news.ycombinator.com/item?id=44746992

This command will make your MacBook hibernate when lid is closed or the laptop sleeps, so RAM is written to disk and the system powers down. The downside is that it does increase the amount of time it takes to resume.

A nice side benefit though, is that fingerprint is not accepted on first unlock, I believe secrets are still encrypted at this stage similar to cold boot. A fingerprint still unlocks from screensaver normally, as long as the system does not sleep (and therefore hibernate)

jakobdabo 2 days ago||
> I believe secrets are still encrypted at this stage similar to cold boot.

Does this mean that the Signal desktop application doesn't lock/unlock its (presumably encrypted) database with a secret when locking/unlocking the laptop?

dagmx 2 days ago||
It wouldn’t matter because the whole OS would be evicted from memory and the entire storage encrypted.

Signal itself wouldn’t even be detectable as an app

patrickmay 2 days ago|||
Is the knowledge of which finger to use protected as much as a passcode? Law enforcement might have the authority to physically hold the owner's finger to the device, but it seems that the owner has the right to refuse to disclose which finger is the right one. If law enforcement doesn't guess correctly in a few tries, the device could lock itself and require the passcode.

Another reason to use my dog's nose instead of a fingerprint.

parl_match 2 days ago|||
I really wish Apple would offer a pin option on macos. For this reason, precisely. Either that, or an option to automatically disable touchid after a short amount of time (eg an hour or if my phone doesn't connect to the laptop)
fpoling 2 days ago|||
You can setup a separated account with a long password on MacOS and remove your user account from accounts that can unlock FileVault. Then you can change your account to use a short password. You can also change various settings regarding how long Mac has to sleep before requiring to unlock FileVault.
AnonHP 2 days ago||
I didn’t understand how a user that cannot unlock FileVault helps. Can you please elaborate on this setup? Thanks.
fpoling 2 days ago||
With that setup on boot or after a long sleep one first must log in into an account with longer password. Then one logs out of that and switches to the primary account with a short password.
xoa 2 days ago||||
As another alternative, rather than using Touch ID you can setup a Yubikey or similar hardware key for login to macOS. Then your login does indeed become a PIN with 3 tries before lockout. That plus a complex password is pretty convenient but not biometric. It's what I've done for a long time on my desktop devices.
1718627440 1 day ago||||
I often see people use a "pin" on Windows and I never got it. What is the purpose of a pin makes it different from a password?
NewsaHackO 1 day ago||
PIN numbers are easier to remember. Remember, 99% of the population does not care about defense against state actors, just stopping nosy co-workers or family members from looking at their stuff. The next group (which I would include myself in) is concerned about theft (both physical and remote), where someone can get "unlimited" access to your machine and may be able to defeat a short PIN but is unlikely to beat a strong password. If you are in the realm of defending against state actors, then that is something you have to take multiple steps to ensure, and a single slip-up will tank your operation (like with this lady).
djhn 2 days ago||||
Wait, wasn’t touch id phased out together with the intel touch bar macbooks? I’ve never used anything but a long password to unlock.
fckgw 2 days ago||
No, it's been part of the power button since then.
Wistar 2 days ago||||
On my Macbook Pro, I usually need to use both touch and a password but that might be only when some hours have passed between log ins.
NetMageSCW 2 days ago||||
You can script a time out if desired.
redeeman 2 days ago|||
uhm, are you saying its not possible to require an actual password to unlock osx?
tedd4u 2 days ago|||
My guess is they want to have a PIN as a short-term credential analogous to the Touch ID, that is, it only works for X hours per password auth before needing password auth again, and then you only get X tries on the PIN before it either locks the PIN out and you need the full password to reactivate it (or I guess it could wipe the laptop à la iPhone).
parl_match 2 days ago|||
> uhm, are you saying its not possible to require an actual password to unlock osx?

uhm, are saying that i'm saying that? if so, please show me where i said that. thank you

redeeman 1 day ago||
no, thats why i was asking, as i was not fully sure what you meant
parl_match 1 day ago||
what im saying is that i dont want to type in a long ass password all the time

and biometrics have "legal problems" as stated above

a pin or allowing touchid to automatically be disabled after a period of time or computer movement ("please enter password to login") would be greatly appreciated

as it stands now, i have biometrics disabled.

redeeman 1 day ago||
seems reasonable
thecapybara 2 days ago||||
There's only ten possible guesses, and most people use their thumb and/or index finger, leaving four much likelier guesses.

Also, IANAL, but I'm pretty sure that if law enforcement has a warrant to seize property from you, they're not obligated to do so immediately the instant they see you - they could have someone follow you and watch to see how you unlock your phone before seizing it.

z3phyr 2 days ago|||
0.1 in itself is a very good odd, and 0.1 * n tries is even more laughable. Also most people have two fingers touchID, which makes this number close to half in reality.
goda90 2 days ago|||
Remember that our rights aren't laws of nature. They have to be fought for to be respected by the government.
joecool1029 2 days ago|||
> they can't make you give them your password.

Except when they can: https://harvardlawreview.org/print/vol-134/state-v-andrews/

tedd4u 2 days ago||
75 footnotes for 89 sentences, nice! I guess that's how they roll over at the HLR.
notyourwork 2 days ago|||
I don't get why I can be forced to use my biometrics to unlock but I cannot be forced to give a pin. Doesn't jive in my brain.
deltastone 2 days ago|||
It's something you know vs. something you have. That's how the legal system sees it. You might not tell someone the pin to your safe, but if police find the key to it, or hire a locksmith to drill out your safe, it's theirs with a warrant.

It's interesting in the case of social media companies. Technically the data held is the companies data (Google, Meta, etc.) however courts have ruled that a person still has an expectation of privacy and therefore police need a warrant.

soneil 14 hours ago||||
Compelled speech is protected, fingerprints aren't.

Imagine it's 1926 and none of this tech is an issue yet. The police can fingerprint and photograph you at intake, they can't compel speech or violate the 5th.

That's exactly what's being applied here. It's not that the police can do more or less than they could in 1926, it's that your biometrics can do more than they did in 1926. They're just fingerprinting you / photographing you .. using your phone.

direwolf20 2 days ago||||
When they arrest you, they have physical control of your body. You're in handcuffs. They can put your fingers against the unlock button. You can make a fist, but they can have more strength and leverage to unfist your fist.

There's no known technique to force you to input a password.

sejje 2 days ago|||
Are we not talking about a legal difference? That was my reading.
direwolf20 2 days ago|||
The law follows practicality in this instance.
notyourwork 1 day ago|||
Yes, my statement was related to legal means. I’m not a lawyer.
QuiEgo 2 days ago|||
Well there is one known technique. https://xkcd.com/538/
wan23 2 days ago||||
The fifth amendment gives you the right to be silent, but they didn't write in anything about biometrics.
sejje 2 days ago||||
"technicality" or "loophole" is probably the word.

I fully agree, forced biometrics is bullshit.

I say the same about forced blood removal for BAC testing. They can get a warrant for your blood, that's crazy to me.

quietsegfault 2 days ago|||
[dead]
deltastone 2 days ago|||
Also, using biometrics on a device, and your biometrics unlock said device, do wonders for proving to a jury that you owned and operated that device. So you're double screwed in that regard.
direwolf20 2 days ago|||
Remember, this isn't how it works in every country.
tim333 1 day ago|||
One thing I miss from windows (on mac now) is there was an encrypted vault program that you could have hide so it wasn't on the desktop or program list but could still be launched. That way you could have private stuff that attackers would likely not even know was there.
mbil 2 days ago|||
Reminder that you can press the iPhone power button five times to require passcode for the next unlock.
rawgabbit 2 days ago|||
Serious question. If I am re-entering the US after traveling abroad, can customs legally ask me to turn the phone back on and/or seize my phone? I am a US citizen.

Out of habit, I keep my phone off during the flight and turn it on after clearing customs.

Analemma_ 2 days ago|||
If you are a US citizen, you legally cannot be denied re-entry into the country for any reason, including not unlocking your phone. They can make it really annoying and detain you for a while, though.
monocasa 2 days ago||
They can also practically keep your phone indefinitely.
verall 2 days ago||||
my understanding is that they can hold you for a couple days without charges for your insubordination but as a citizen they have to let you back into the country or officially arrest you, try to get an actual warrant, etc.
direwolf20 2 days ago||
they can just break the law
rurban 1 day ago||
There is no law when entering the country. They can do everything they want, or making up anything they'll imagine.
gogasca 2 days ago|||
[dead]
thecapybara 2 days ago||||
Did you know that on most models of iPhone, saying "Hey Siri, who's iPhone is this?" will disable biometric authentication until the passcode is entered?
rconti 2 days ago|||
hm. didn't work on my 17 pro :( might be due to a setting i have.
fragmede 2 days ago|||
They disabled that in like iOS 18.
fogzen 2 days ago||||
In case anyone is wondering: In newer versions of MacOS, the user must log out to require a password. Locking screen no longer requires password if Touch ID is enabled.
alistairSH 2 days ago|||
Is that actually true? I'm fairly confident my work Mac requires a password if it's idle more than a few days (typically over the weekend).
raw_anon_1111 2 days ago||||
Settings -> lock screen -> “Require password after screen saver begins or display is turned off”
fogzen 2 days ago||
Even with that option set to "Immediately" you can still use Touch ID after locking.
raw_anon_1111 2 days ago||
I am not sure how it works on Macs, but on iPhone, after first unlock after a reboot, it’s trivial for law enforcement to break into your iPhone - the same with Android.
jen729w 2 days ago|||
Shift+Option+Command+Q is your fastest route there, but unsaved work will block.
qingcharles 2 days ago||||
Everyone makes this same comment on each of these threads, but it's important to remember this only works if you have some sort of advance warning. If you have the iPhone in your hand and there is a loaded gun pointed at your head telling you not to move, you probably won't want to move.
kstrauser 2 days ago||||
Or squeeze the power and volume buttons for a couple of seconds. It’s good to practice both these gestures so that they become reflex, rather than trying to remember them when they’re needed.
regenschutz 2 days ago|||
Sad, neither of those works on Android. Pressing the power button activates the emergency call screen with a countdown to call emergency services, and power + volume either just takes a screenshot or enables vibrations/haptics depending on which volume button you press.
thallium205 2 days ago|||
On Pixel phones, Power + Volume Up retrieves a menu where you can select "Lockdown".
rationalist 2 days ago||
Not on my Pixel phone, that just sets it to vibrate instead of ring. Holding down the power button retrieves a menu where you can select "Lockdown".
zerocrates 2 days ago||
On my 9 you get a setting to choose if holding Power gets you the power menu or activates the assistant (I think it defaulted to assistant? I have it set to the power menu because I don't really ever use the assistant.)
rationalist 2 days ago||
Yes, that was the default for me, but I changed it in settings.
silisili 2 days ago|||
Did you check your phone settings? Mine has an option to add it to the power menu, so you get to it by whichever method you use to do that (which itself is sad that phones are starting to differ in what the power key does).
pkulak 2 days ago|||
Oh wow, just going into the "should I shutdown" menu also goes into pre-boot lock state? I didn't know that.
duskwuff 2 days ago||
It doesn't reenter a BFU state, but it requires a passcode for the next unlock.
snuxoll 2 days ago||
It's close enough, because (most of) the encryption keys are wiped from memory every time the device is locked, and this action makes the secure enclave require PIN authentication to release them again.
overfeed 2 days ago||
> It's close enough

Not really, because tools like Cellbrite are more limited with BFU, hence the manual informing LEO to keep (locked) devices charged, amd the countermeasures being iOS forcefully rebooting devices that have been locked for too long.

CGMthrowaway 2 days ago||
There is a way now to force BFU from a phone that is turned on, I can't remember the sequence
kccqzy 2 days ago|||
It’s called restarting the phone.
CGMthrowaway 1 day ago||
I believe doing the standard Restart everyone knows is not enough though. The instructions saw were these

Quick-press Volume Up, then Quick-press Volume Down. Hold the side power button until the screen turns black (approx. 10 seconds). Immediately hold both the side button and the Volume Down button for 5 seconds. Release the side button but continue holding the Volume Down button for another 10 seconds. The screen will remain black. If the Apple logo appears, the side button was held too long, and the process must be repeated.

kccqzy 1 day ago||
That’s DFU mode. We are talking about BFU in this thread.
duskwuff 2 days ago|||
Eh? BFU ("before first unlock") is, by definition, the state that a phone is in when it is turned on. There's no need to "force" it.

If you mean forcing an iOS device out of BFU, that's impossible. The device's storage is encrypted using a key derived from the user's passcode. That key is only available once the user has unlocked the device once, using their passcode.

paulsmith 2 days ago|||
Alternately, hold the power button and either volume button together for a few seconds.
tosapple 2 days ago||
This is the third person advocating button squeezing, as a reminder: IF a gun is on you the jig is up, you can be shot for resisting or reaching for a potential weapon. Wireless detonators do exist, don't f around please.
rustyhancock 2 days ago|||
As far as I know lockdown mode and BFU prevent touch ID unlocking.

At least a password and pin you choose to give over.

raw_anon_1111 2 days ago|||
As if the government is not above breaking the law and using rubber hose decryption. The current administration’s justice department has been caught lying left and right
qingcharles 2 days ago|||
And threats aren't illegal. They can put a gun to wife's head and say they're going to shoot. It's up to you then to call their bluff.
direwolf20 2 days ago|||
Plausible deniability still works. You enter your duress code and your system boots to a secondary partition with Facebook and Snapchat. No such OS exists.
laosb 1 day ago||
How plausible the deniability is when they discover you only have those two apps and both logged out due to inactivity, while they can see your storage usage is definitely larger than those two apps?
p0w3n3d 2 days ago|||
Allowed to require - very mildly constructed sentence, which could include torture or force abuse...

https://xkcd.com/538/

neves 2 days ago|||
I just searched the case. I'm appalled. It looks like USA doesn't have legal protection for reporter sources. Or better, Biden created some, but it was revoked by the current administration.

The real news here isn't privacy control in a consumer OS ir the right to privacy, but USA, the leader of the free world, becoming an autocracy.

innagadadavida 1 day ago||
Is there a way to setup Mac disabling Touch ID if the linked phone goes into lockdown or Face ID requires passcode? Apple could probably add that.
TheDong 2 days ago||
I find it so frustrating that Lockdown Mode is so all-or-nothing.

I want some of the lockdown stuff (No facetime and message attachments from strangers, no link previews, no device connections), but like half of the other ones I don't want.

Why can't I just toggle an iMessage setting for "no link preview, no attachments", or a general setting for "no automatic device connection to untrusted computers while locked"? Why can't I turn off "random dickpicks from strangers on iMessage" without also turning off my browser's javascript JIT and a bunch of other random crap?

Sure, leave the "Lockdown mode" toggle so people who just want "give me all the security" can get it, but split out individual options too.

Just to go through the features I don't want:

* Lockdown Mode disables javascript JIT in the browser - I want fast javascript, I use some websites and apps that cannot function without it, and non-JIT js drains battery more

* Shared photo albums - I'm okay viewing shared photo albums from friends, but lockdown mode prevents you from even viewing them

* Configuration profiles - I need this to install custom fonts

Apple's refusal to split out more granular options here hurts my security.

quizzical8432 2 days ago||
I’m with you on the shared photo albums. I’d been using lockdown mode for quite a while before I discovered this limitation, though. For me, this is one I’d like to be able to selectively enable (like the per-website/app settings). In my case, it was a one-off need, so I disabled lockdown mode, shared photos, then enabled it again.

The other feature I miss is screen time requests. This one is kinda weird - I’m sure there’s a reason they’re blocked, but it’s a message from Apple (or, directly from a trusted family member? I’m not 100% sure how they work). I still _recieve_ the notification, but it’s not actionable.

While I share with your frustration, though, I do understand why Apple might want to have it as “all-or-nothing”. If they allow users to enable even one “dangerous” setting, that ultimately compromises the entire security model. An attacker doesn’t care which way they can compromise your device. If there’s _one_ way in, that’s all they need.

Ultimately, for me the biggest PiTA with lockdown mode is not knowing if it’s to blame for a problem I’m having. I couldn’t tell you how many times I’ve disabled and re-enabled it just to test something that should work, or if it’s the reason a feature/setting is not showing up. To be fair, most of the time it’s not the issue, but sometimes I just need to rule it out.

Terretta 2 days ago|||
The profiles language may be confusing -- what you can't do is change them while in Lockdown mode.
ectospheno 2 days ago|||
Family albums work with lockdown mode. You can also disable web restrictions per app and website.
ethepax 2 days ago|||
Agreed. If I know my threat model, I don’t need unnecessary restrictions.
everdrive 2 days ago||
>* Lockdown Mode disables javascript JIT in the browser - I want fast javascript, I use some websites and apps that cannot function without it, and non-JIT js drains battery more

This feature has the benefit of teaching users (correctly) that browsing the internet on a phone has always been a terrible idea.

rantingdemon 2 days ago|||
I'll bite. Why is it so terrible? I'm browsing this site right now on my phone and don't see the horror.
everdrive 1 day ago|||
No keyboard, no mouse, tiny screen. Every single action you'd like to take is slower and more cumbersome. Want to selection a portion of a URL? Well, get ready for an adventure. Tap the URL bar once, then -- oops, now it thinks you want to copy. You can't tap the individual sections. Try to move the little "copy bars" but oops, the press didn't register because they're tiny. Spend about a minute randomly pressing the URL bar until you can actually get the behavior your want. Or, try to switch tabs. It's not hard per se, but it's an order off magnitude slower than ctrl+tab. Or search within a page. Can you just hit ctrl+g and start typing and then press ctrl+g again? No, no, you need to enter a menu, enter a submenu, then wait for the onscreen keyboard to show up, then glide your finger over that with a few corrections, then move your finger down the the tiny next button.

It's all objectively terrible, and it accomplishes nothing except allowing the user to use the internet right then and there.

mghackerlady 2 days ago|||
Phone networks by design track you more precisely than possible over a conventional internet connection to facilitate the automatic connection to the nearest available network. Also, for similar reasons it requires the phone network to know that it is your phone
LoganDark 2 days ago|||
You don't need to connect to the internet for that. It has nothing to do with web browsing at all.
ziml77 1 day ago||||
The phone network already needs to know where your phone is to be able to route incoming calls.

Also, I don't get how the situation with your home internet connection changes much. Your ISP knows exactly where you are because your house doesn't move.

mghackerlady 1 day ago||
Right, but for most people you can reasonably be expected to be in your house so it isn't that big of a security risk
TheDong 1 day ago|||
Installed apps can track you even more, so what you're arguing for is presumably not "don't use websites on your phone", but rather "do not use your phone, just use your desktop computer".

Which sure, not using your phone is more secure, but good luck convincing users that they shouldn't use any apps or websites on the go.

jgwil2 2 days ago|||
I think that ship has sailed.
nxobject 2 days ago||
Sadly, they still got to her Signal on her Desktop – her sources might still be compromised. It's sadly inherent to desktop applications, but I'm sad that a lot more people don't know that Signal for Desktop is much, much less secure against adversaries with your laptop.
tadzikpk 2 days ago||
> I'm sad that a lot more people don't know that Signal for Desktop is much, much less secure against adversaries with your laptop

Educate us. What makes it less secure?

armadyl 2 days ago|||
In addition to what the other person who replied said, ignoring that iOS/Android/iPadOS is far more secure than macOS, laptops have significantly less hardware-based protections than Pixel/Samsung/Apple mobile devices do. So really the only way a laptop in this situation would be truly secure from LEO is if its fully powered off when it’s seized.
tkel 1 day ago||
ARM/M1 macOS took their hardware platform from iOS. TEE, signed/verified/readonly system files, etc. They are similar in security now.

[1] https://asahilinux.org/docs/platform/security/ [2] https://support.apple.com/guide/security/hardware-security-o... [3] https://eclecticlight.co/2022/01/04/booting-an-m1-mac-from-h...

digiown 2 days ago|||
The key in the desktop version is not always stored in the secure enclave, is my assumption (it definitely supports plaintext storage). Theoretically this makes it possible to extract the key for the message database. Also a different malicious program can read it. But this is moot anyway if the FBI can browse through the chats. This isn't what failed here.
anigbrowl 2 days ago||
Also last time I looked (less than 1 year ago) files sent over Signal are stored in plain, just with obfuscated filenames. So even without access to Signal it's easy to see what message attachments a person has received, and copy any interesting ones.
stronglikedan 2 days ago|||
If people don't have Signal set to delete sensitive messages quickly, then they may as well just be texting.
AdamN 2 days ago||
That's a strong statement. Also imho it's important that we use Signal for normal stuff like discussing where to get coffee tomorrow - no need for disappearing messages there.
aschobel 2 days ago|||
I'm weird, i even have disappearing messages for my coffee chats. It's kind of refreshing not having any history.
zikduruqe 2 days ago||
I'm an inbox zero person... I keep even my personal notes to disappear after 2 days. For conversations 1 day.
CGMthrowaway 2 days ago||||
Strong and accurate. Considering non-disappearing messages the same as texts is not the same thing as saying all Signal messages ought to be disappearing or else the app is useless.

Telegram allows you to have distinct disappearing settings for each chat/group. Not sure how it works on Signal, but a solution like this could be possible.

tptacek 2 days ago|||
Not if you're using Signal for life-and-death secure messaging; in that scenario it's table stakes.
NewsaHackO 2 days ago|||
Yea, I also would want to question the conclusions in the article. Was the issue that they couldn't unlock the iPhone, or that they had no reason to pursue the thread? To my understanding, the Apple ecosystem means that everything is synced together. If they already got into her laptop, wouldn't all of the iMessages, call history, and iCloud material already be synced there? What would be the gain of going after the phone, other than to make the case slightly more watertight?
NetMageSCW 2 days ago||
Not if she’s smart.
mrandish 2 days ago|||
I would have thought reporters with confidential sources at that level would already exercise basic security hygiene. Hopefully, this incident is a wake up call for the rest.
pbhjpbhj 2 days ago||
Did she have Bitlocker or FileVault or other disk encryption that was breeched? (Or they took the system booted as TLAs seek to do?)
bmicraft 2 days ago|||
There was a story here the other day, bitlocker keys stored in your Microsoft account will be handed over.
deltastone 2 days ago|||
This has been known for a while, though I don't know if your typical layperson was aware until recently. People need to remember that any access a company has to a device, so does LE with a warrant. Even moreso once you get into federal resources and FISA courts.
direwolf20 2 days ago|||
Which windows does by default and makes it hard to turn off
deltastone 2 days ago||||
Bitlocker isn't secure, for several reasons, that I won't get into on here.
MoonWalk 2 days ago|||
breached
pbhjpbhj 2 days ago||
Ha, no, shoved down someone's trousers! ;oP
827a 2 days ago||
Is there an implication here that they could get into an iPhone with lower security settings enabled? There's Advanced Data Protection, which E2EEs more of your data in iCloud. There's the FaceID unlock state, which US law enforcement can compel you to unlock; but penta-click the power button and you go into PIN unlock state, which they cannot compel you to unlock.

My understanding of Lockdown Mode was that it babyifies the device to reduce the attack surface against unknown zero-days. Does the government saying that Lockdown Mode barred them from entering imply that they've got an unknown zero-day that would work in the PIN-unlock state, but not Lockdown Mode?

kingnothing 2 days ago||
It's relatively well know that the NSO Group / Pegasus is what governments use to access locked phones.
827a 2 days ago|||
This was known, in the past, but if its relying on zero-days Apple & Google are, adversarially, attempting to keep up with and patch, my assumption would not be that pegasus is, at any time, always able to breach a fully-updated iPhone. Rather, its a situation where maybe there are periods of a few months at a time where they have a working exploit, until Apple discovers it and patches it, repeat indefinitely.
kingnothing 2 days ago|||
It's always a game of cat and mouse, but NSO had a quarter billion USD in annual revenue in 2020. They are clearly providing highly effective spyware to governments around the world. It wouldn't surprise me if they have that many zero day, zero click exploits that they can always get in to a phone. We're talking nation state espionage here... they probably have insiders at Apple and Google who introduce subtle unnoticeable bugs in core OS stacks.
direwolf20 2 days ago|||
How does Apple discover their exploits? I'm sure they keep some around for extremely high value targets.
halJordan 2 days ago|||
The nso group is on the entity list, so no western govt is using it. And it was never used to gain access to devices that they already had physical control over.
Obscurity4340 1 day ago||
Apple regularly hires Israeli ex-millitary devs
zymhan 2 days ago||
Yes
macintux 2 days ago||
> Natanson said she does not use biometrics for her devices, but after investigators told her to try, “when she applied her index finger to the fingerprint reader, the laptop unlocked.”

Curious.

QuantumNomad_ 2 days ago||
Probably enabled it at some point and forgot. Perhaps even during setup when the computer was new.
intrasight 2 days ago|||
My recollection is the computers do by default ask the user to set up biometrics
NewsaHackO 2 days ago|||
I want to say that is generous of her, but one thing that is weird is if I didn’t want someone to go into my laptop and they tried to force me to use my fingerprint to unlock it, I definitely wouldn’t use the finger I use to unlock it on the first try. Hopefully, Apple locks it out and forces a password if you use the wrong finger “accidentally” a couple of times.
altairprime 2 days ago||
Correct. That’s why my Touch ID isn’t configured to use the obvious finger.
throwawayq3423 2 days ago||
Honestly, that's clever.
dyauspitr 2 days ago|||
She has to have set it up before. There is no way to divine a fingerprint any other way. I guess the only other way would be a faulty fingerprint sensor but that should default to a non-entry.
giraffe_lady 2 days ago|||
Could be a parallel construction type thing. They already have access but they need to document a legal action by which they could have acquired it so it doesn't get thrown out of court.

I think this is pretty unlikely here but it's within the realm of possibility.

tsol 2 days ago||
Seems like it would be hard to fake. The was she tells it she put her finger on the pad and the OS unlocked the account. Sounds very difficult to do
operator-name 2 days ago||
I think they mean if they already have her fingerprint from somewhere else, and a secret backdoor into the laptop. Then they could login, setup biometrics and pretend they had first access when she unlocked it. All without revealing their backdoor.
quesera 2 days ago|||
> faulty fingerprint sensor

The fingerprint sensor does not make access control decisions, so the fault would have to be somewhere else (e.g. the software code branch structure that decides what to do with the response from the secure enclave).

d1sxeyes 2 days ago||
If you're interested in this in more detail, check this out:

https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/

quesera 1 day ago||
This is a great read, but note that it's specific to Windows and Dell/Lenovo/Microsoft.

Apple does it different(ly), and I'd argue more securely. Being able to specify the full chain of hardware, firmware, and software always has its advantages.

Apple's fingerprint readers do not perform authentication locally -- instead the data read from the sensor (or derivatives thereof) is compared to a reference which is stored in the secure enclave in the Apple silicon (Ax Tx or Mx) of the Mac or iOS device itself.

nozzlegear 2 days ago|||
My read on this is that she tried to bluff, even though the odds were astronomically high that they'd call her on it. She didn't have anything to lose by trying a little white lie. It's what I would have done in the same situation, anyway.
b112 2 days ago|||
Very much so, because the question is... did she set it up in the past?

How did it know the print even?

ezfe 2 days ago||
Why is this curious?
macintux 2 days ago||
There appear to be a relatively few possibilities.

* The reporter lied.

* The reporter forgot.

* Apple devices share fingerprint matching details and another device had her details (this is supposed to be impossible, and I have no reason to believe it isn't).

* The government hacked the computer such that it would unlock this way (probably impossible as well).

* The fingerprint security is much worse than years of evidence suggests.

Mainly it was buried at the very end of the article, and I thought it worth mentioning here in case people missed it.

orwin 2 days ago|||
My opinion is that she set it up, it didn't work at first, she didn't use it, forgot that it existed, and here we are.

> Apple devices share fingerprint matching details and another device had her details

I looked into it quite seriously for windows thinkpads, unless Apple do it differently, you cannot share fingerprint, they're in a local chip and never move.

fragmede 2 days ago||
So how does TouchID on an external keyboard work without having to re-set up fingerprints?
piperswe 2 days ago||
Presumably the fingerprint data is stored in the Mac's Secure Enclave, and the external keyboard is just a reader
ezfe 2 days ago|||
The reporter lying or forgetting seems to be the clear answer, there's really no reason to believe it's not one of those. And the distinction between the two isn't really important from a technical perspective.

Fingerprint security being poor is also unlikely, because that would only apply if a different finger had been registered.

mmooss 2 days ago||
Don't be idiots. The FBI may say that whether or not they can get in:

1. If they can get in, now people - including high-value targets like journalists - will use bad security.

2. If the FBI (or another agency) has an unknown capability, the FBI must say they can't get in or reveal their capabilities to all adversaries, including to even higher-profile targets such as counter-intelligence targets. Saying nothing also risks revealing the capability.

3. Similarly if Apple helped them, Apple might insist that is not revealed. The same applies to any third party with the capability. (Also, less significantly, saying they can't get in puts more pressure on Apple and on creating backdoors, even if HN readers will see it the other way.)

Also, the target might think they are safe, which could be a tactical advantage. It also may exclude recovered data from rules of handling evidence, even if it's unusable in court. And at best they haven't got in yet - there may be an exploit to this OS version someday, and the FBI can try again then.

coppsilgold 2 days ago|
I would not recommend that one trust a secure enclave with full disk encryption (FDE). This is what you are doing when your password/PIN/fingerprint can't contain sufficient entropy to derive a secure encryption key.

The problem with low entropy security measures arises due to the fact that this low entropy is used to instruct the secure enclave (TEE) to release/use the actual high entropy key. So the key must be stored physically (eg. as voltage levels) somewhere in the device.

It's a similar story when the device is locked, on most computers the RAM isn't even encrypted so a locked computer is no major obstacle to an adversary. On devices where RAM is encrypted the encryption key is also stored somewhere - if only while the device is powered on.

pregnenolone 2 days ago|||
RAM encryption doesn’t prevent DMA attacks and perofming a DMA attack is quite trivial as long as the machine is running. Secure enclaves do prevent those and they're a good solution. If implemented correctly, they have no downsides. I'm not referring to TPMs due to their inherent flaws; I’m talking about SoC crypto engines like those found in Apple’s M series or Intel's latest Panther Lake lineup. They prevent DMA attacks and side-channel vulnerabilities. True, I wouldn’t trust any secure enclave never to be breached – that’s an impossible promise to make even though it would require a nation-state level attack – but even this concern can be easily addressed by making the final encryption key depend on both software key derivation and the secret stored within the enclave.
QuiEgo 1 day ago|||
I recommend reading the AES-XTS spec, in particular the “tweak”. Or for AES-GCM look at how IV works.

I also recommend looking up PUF and how modern systems use it in conjunction with user provided secrets to dervie keys - a password or fingerprint is one of many inputs into a kdf to get the final keys.

The high level idea is that the key that's being used for encryption is derived from a very well randomized and protected device-unique secret setup at manufacturing time. Your password/fingerprint/whatever are just adding a little extra entropy to that already cryptographically sound seed.

Tl;dr this is a well solved problem on modern security designs.

coppsilgold 1 day ago||
> I recommend reading the AES-XTS spec, in particular the “tweak”. Or for AES-GCM look at how IV works.

What does this have to with anything? Tweakable block ciphers or XTS which converts a block cipher to be tweakable operate with an actualized key - the entropy has long been turned into a key.

> Your password/fingerprint/whatever are just adding a little extra entropy to that already cryptographically sound seed.

Correct. The "cryptographically sound seed" however is stored inside the secure enclave for anyone with the capability to extract. Which is the issue I referenced.

And if what you add to the KDF is just a minuscule amount of entropy you may as well have added nothing at all - they perform the addition for the subset of users that actually use high entropy passwords and because it can't hurt. I don't think anyone adds fingerprint entropy though.

QuiEgo 1 day ago||
> The "cryptographically sound seed" however is stored inside the secure enclave for anyone with the capability to extract.

Sorry, I'm not sure I follow here. Is anyone believed to have the capability to extract keys from the SE?

The secure enclave (or any Root of Trust) do not allow direct access to keys, they keep the keys locked away internally and use them at your request to do crypto operations. You never get direct access to the keys. The keys used are protected by using IVs, tweaks, or similar as inputs during cryptographic operations so that the root keys can not be derived from the ciphertext, even if the plaintext is controlled by an attacker and they have access to both the plaintext and ciphertext.

Is your concern the secure enclave in an iPhone is deflatable, and in such a way as to allow key extraction of device unique seeds it protects?

Do you have any literature or references where this is known to have occurred?

Tone is sometimes hard in text, so I want to be clear, I'm legit asking this, not trying to argue. If there are any known attacks against Apple's SE that allow key extraction, would love to read up on them.

coppsilgold 1 day ago||
> Is your concern the secure enclave in an iPhone is deflatable, and in such a way as to allow key extraction of device unique seeds it protects?

This is a safe assumption to make as the secret bits are sitting in a static location known to anyone with the design documents. Actually getting to them may of course be very challenging.

> Do you have any literature or references where this is known to have occurred?

I'm not aware of any, which isn't surprising given the enormous resources Apple spent on this technology. Random researchers aren't very likely to succeed.

throwmeaway820 2 days ago||
It seems unfortunate that enhanced protection against physically attached devices requires enabling a mode that is much broader, and sounds like it has a noticeable impact on device functionality.

I never attach my iPhone to anything that's not a power source. I would totally enable an "enhanced protection for external accessories" mode. But I'm not going to enable a general "Lockdown mode" that Apple tells me means my "device won’t function like it typically does"

jonpalmisc 2 days ago||
There is a setting as of iOS 26 under "Privacy & Security > Wired Accessories" in which you can make data connections always prompt for access. Not that there haven't been bypasses for this before, but perhaps still of interest to you.
H8crilA 2 days ago|||
GrapheneOS does this by default - only power delivery when locked. Also it's a hardware block, not software. Seems to be completely immune to these USB exploit tools.
aaronmdjones 2 days ago||
It also has various options to adjust the behaviour, from no blocks at all, to not even being able to charge the phone (or use the phone to charge something else) -- even when unlocked. Changing the mode of operation requires the device PIN, just as changing the device PIN does.

Note that it behaves subtly differently to how you described in case it was connected to something before being locked. In that case data access will remain -- even though the phone is now locked -- until the device is disconnected.

Terretta 2 days ago|||
> I would totally enable an "enhanced protection for external accessories" mode.

Anyone can do this for over a decade now, and it's fairly straightforward:

- 2014: https://www.zdziarski.com/blog/?p=2589

- recent: https://reincubate.com/support/how-to/pair-lock-supervise-ip...

This goes beyond the "wired accessories" toggle.

UltraSane 2 days ago|||
Computer security is generally inversely proportional to convenience. Best opsec is generally to have multiple devices.
pkteison 2 days ago|||
It isn’t. Settings > Privacy & Security > Wired Accessories

Set to ask for new accessories or always ask.

sodality2 2 days ago||
I have to warn you, it does get annoying when you plug in your power-only cable and it still nags you with the question. But it does work as intended!
neilalexander 2 days ago||
You might want to check that charger. I have the same option set to ask every time and it never appears for chargers.
mrandish 2 days ago|||
> it has a noticeable impact on device functionality.

The lack of optional granularity on security settings is super frustrating because it leads to many users just opting out of any heightened security.

ur-whale 2 days ago||
> I never attach my iPhone to anything that's not a power source.

It's "attached" to the wifi and to the cell network. Pretty much the same thing.

ChrisArchitect 2 days ago||
Previously, direct link to the court doc:

FBI unable to extract data from iPhone 13 in Lockdown Mode in high profile case [pdf]

https://storage.courtlistener.com/recap/gov.uscourts.vaed.58...

(https://news.ycombinator.com/item?id=46843967)

boring-human 2 days ago|
Can a hacked phone (such as one that was not in Lockdown Mode at one point in time) persist in a hacked state?

Obviously, the theoretical answer is yes, given an advanced-enough exploit. But let's say Apple is unaware of a specific rootkit. If each OS update is a wave, is the installed exploit more like a rowboat or a frigate? Will it likely be defeated accidentally by minor OS changes, or is it likely to endure?

This answer is actionable. If exploits are rowboats, installing developer OS betas might be security-enhancing: the exploit might break before the exploiters have a chance to update it.

quenix 2 days ago||
Forget OS updates. The biggest obstacle to exploit persistence: a good old hard system reboot.

Modern iOS has an incredibly tight secure chain-of-trust bootloader. If you shut your device to a known-off state (using the hardware key sequence), on power on, you can be 99.999% certain only Apple-signed code will run all the way from secureROM to iOS userland. The exception is if the secureROM is somehow compromised and exploited remotely (this requires hardware access at boot-time so I don't buy it).

So, on a fresh boot, you are almost definitely running authentic Apple code. The easiest path to a form of persistence is reusing whatever vector initially pwned you (malicious attachment, website, etc) and being clever in placing it somewhere iOS will attempt to read it again on boot (and so automatically get pwned again).

But honestly, exploiting modern iOS is already difficult enough (exploits go for tens millions $USD), persistence is an order of magnitude more difficult.

doublerabbit 2 days ago|||
It's why I keep my old iPhone XR on 15.x for jail breaking reasons. I purchased an a new phone specially for the later versions and online banking.

Apple bought out all the jail breakers as Denuvo did for the game crackers.

noname120 2 days ago||
> Apple bought out all the jail breakers > Denuvo did for the game crackers

Do you have sources for these statements?

doublerabbit 2 days ago||
Like anything in that field its more NDA, antidotal.

> in 2018, the prominent Denuvo cracker known as "Voksi" (of REVOLT) was arrested in Bulgaria following a criminal complaint from Denuvo.

https://www.dsogaming.com/news/denuvo-has-sued-revolts-found...

That's how you get off such charges. I'll work for you, if you drop charges. There was a reddit post I can't find when EMPRESS had one of their episodes where she was asked if she wanted to work for. It's happened in the cracking scene before.

> The jailbreaking community is fractured, with many of its former members having joined private security firms or Apple itself. The few people still doing it privately are able to hold out for big payouts for finding iPhone vulnerabilities. And users themselves have stopped demanding jailbreaks, because Apple simply took jailbreakers’ best ideas and implemented them into iOS.

https://www.vice.com/en/article/iphone-jailbreak-life-death-...

And from the jail break community discord.

digiown 2 days ago|||
Secure boot and verified system partition is supposed to help with that. It's for the same reason jailbreaks don't persist across reboots these days.
nxobject 2 days ago|||
Re: reboots – TFA states that recent iPhones reboot every 3 days when inactive for the same reasons. Of course, now that we know that it's linked to inactivity, black hatters will know how to avoid it...
maldev 2 days ago||
You should read into IOS internals before commenting stuff like this. Your answer is wrong, and rootkits have been dead on most OS's for years, but ESPECIALLY IOS. Not every OS is like Linux where security is second.

Even a cursory glance would show it's literally impossible on IOS with even a basic understanding.

More comments...