Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
"Nevertheless, since it's an unpatchable issue, it's a security risk that iOS users should be aware, and an incentive to upgrade to newer handsets."

Apple released it so force upgrades to a new iPhone! :)
Planned obsolescence confirmed! Time to lawyer up! Anyone else wants to hop on the class action??? Time for Tim Crook to pay!/s
 
  • Like
Reactions: BuddyTronic
Yes the most secure consumer-grade phones in the world (that not even the FBI could hack into without a lot of help) and they need to “review their code more often”. Do you know how hard it is to write code? Or how many millions of lines of code go into these devices?
Every. Single. Device. Has. Security. Flaws.

It. Is. An. 8. Year. Old. Exploit. Writing like that doesn't make it any less severe. And yes I do know how hard it is to write code as I'm a programmer myself. And who says the FBI didn't already have access to this exploit? Or do you believe everything the media tells you?
 
I might use this to put iOS 6 on my iPhone 5 just for kicks. Who wants to bet that Forstall does this too?
 
  • Like
Reactions: Eligos
If you lost your iPhone, how are you going to prevent the thief from going into dfu mode?
I understand your point, but it also goes without saying regardless of this exploit.

If you lose your phone (regardless of this new exploit) all bets are off with regards to security of the data on your device. Too many people have a false sense of security with regards to their device and the "security" vendors such as Apple, Google, and others market to us.
 
  • Like
Reactions: rjohnstone
You can read through the details yourself if you want: https://www.apple.com/business/docs/site/iOS_Security_Guide.pdf

The NAND itself is encrypted with AES 256. The passcode is the weak point, but to generate the AES 256 key from the passcode, you need the passcode and the unique AES 256 key burned into the Secure Enclave on the SOC. The passcode is run through PBKDF2 and then tangled with the AES 256 key in a one-way operation.

So dumping the flash raw means you face AES 256 at full strength, even if you know the passcode, because you also need the AES 256 key from the SOC to be able to recreate the key yourself if you aren't just brute forcing AES.

The fastest way to crack an iPhone is to brute force the passcode and bypass the lockout on attempts if you can. It also gives you the most access to the content.

Individual containers/files can be encrypted with separate keys based on the level of access the OS should have in different states of lock/unlock, on top of the NAND encryption. So if you dump the flash unencrypted, you then also need to crack the containers for things like email and messages which are also AES 256 encryption. All the more reason to focus even more on the passcode and attempt lockout mechanisms.



Apple still manufactures the iPhone 8 and 3rd Gen Air. I wouldn't be surprised if we see manufacturing runs of those that include the patched boot ROM.
I find this quite wrong and childishly.
You seem to forget or not know that once any phone connects to a couple of hundred $ stingray, it communicates with it fully decrypted, therefore a simple 300$ stingray used by police can gain access to all data in the phone, even passwords, lockscreen pass code etc
.... IOs is not that secure as you might think. Nothing is in fact. Just marketing.
 
  • Like
Reactions: Shirasaki
I'm curious about custom firmware thing... Does this mean it can run android or windows arm version? That will be interesting...
 
I love this news, the rotten apple gets exposed!
Recently one of the people here bragged about privacy and hated against amazon, ...
now You lovely person, who exposes you!
i hope this makes the ufo rattle
[automerge]1569601511[/automerge]
Yes the most secure consumer-grade phones in the world (that not even the FBI could hack into without a lot of help) and they need to “review their code more often”. Do you know how hard it is to write code? Or how many millions of lines of code go into these devices?
Every. Single. Device. Has. Security. Flaws.

You seem an expert about bootrom code, please share your wisdom! Hahah
 
  • Like
Reactions: PC_tech
Yes the most secure consumer-grade phones in the world (that not even the FBI could hack into without a lot of help) and they need to “review their code more often”. Do you know how hard it is to write code? Or how many millions of lines of code go into these devices?
Every. Single. Device. Has. Security. Flaws.

Don't fall for his flawed anti-Apple "logic." Just because it allegedly works on 8 year old phone, doesn't mean the exploit has been around for 8 years. LOL.
 
This is great, it means people who want to do crazy things with their older iOS devices can jailbreak them to do so.

There's really no real world security threat; you have to go out of your way to do a bootrom exploit.

Meaning that you have to explicitly install it, or is there the possibility of a remote install?
 
Does this mean that a thief could wipe your phone (full reset) and therefore sell it on, i.e. bypass find my iphone anti theft features like those described here https://www.lifewire.com/security-settings-iphone-thieves-hate-2487730?

If so that is the worst part of this that I can see - Iphone X and earlier would be worth stealing again, leading to a rise in thefts.
Yes... you could wipe and reinstall iOS via this method.

That said, the IMEI could still be blacklisted.

[automerge]1569601979[/automerge]
Meaning that you have to explicitly install it, or is there the possibility of a remote install?
It's a DFU exploit... you need physical access to the phone to install it.
 
Does this mean that a thief could wipe your phone (full reset) and therefore sell it on, i.e. bypass find my iphone anti theft features like those described here https://www.lifewire.com/security-settings-iphone-thieves-hate-2487730?

If so that is the worst part of this that I can see - Iphone X and earlier would be worth stealing again, leading to a rise in thefts.

That is my question. I always feel a bit invincible with my phone knowing that If a thief gets it - worthless.

Someones wants jailbreak and run junk on their phone - meh.
 
Don't fall for his flawed anti-Apple "logic." Just because it allegedly works on 8 year old phone, doesn't mean the exploit has been around for 8 years. LOL.

Why is it anti-Apple logic? I'm just saying how it is. It's at least 8 year old code which has an exploit (which apparently hasn't been properly looked over in 8 years), that's all I said. I'm terribly sorry I can't put in into more positive light in order to cater to your "logic".

And I don't really see the humor in this because literally of million devices are vulnerable now.
 
Luckily I have a iPhone 11 now for which no jailbreak exists so far. The possibilities to jailbreak a phone is also a massive security vulnerability.
 
Why is it anti-Apple logic? I'm just saying how it is. It's at least 8 year old code which has an exploit (which apparently hasn't been properly looked over in 8 years), that's all I said. I'm terribly sorry I can't put in into more positive light in order to cater to your "logic".

And I don't really see the humor in this because literally of million devices are vulnerable now.


It's not about putting Apple into a positive light; it's about the truth. Your attempt at revisionist history doesn't hunt. You claimed, and your exact words were: "It. Is. An. 8. Year. Old. Exploit." If you have any evidence that the exploit has existed for 8 years, then please share it with us. And BTW the humor is the flawed logic, not any security issue, still to be understood, for Apple owners.
 
  • Like
Reactions: mdnz
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.