Don't bother upgrading.
Why not? He just has to put the passcode in.
Don't bother upgrading.
You need to update. Mic is hardware problem on 7 and 7 Plus. You need to replace your iPhone if you affected.I'm still in iOS 10 so meh. If I update my iPhone 7 doesn't it disable the mic too?
An unintended downside: imagine you have a close friend or family member pass away. You/their family want to access their devices afterwards for photos, remembrance, information about their final days, etc. Absent the biometric and passcode (which I am assuming you don't have) you will need the cord access to get in. With a billion devices out there, I am thinking this will happen more frequently than the law enforcement access it is intended to prevent.
And to anyone who wonders why this would even be necessary, I submit you have not suddenly lost a loved one. Not uncommon to go looking for answers or solace in their devices, notify friends of the passing, etc. Asking people to try to get in there within 7 days isn't always realistic or feasible.
That's so cool. iOS 18 can disable itself after 7 attempts and Android p can call a restaurant, speak to a live person and make a reservation for you - in the background - and then let you know.
Uh, okay.
Well played Apple, why not take it one step further and have a trusted Mac / PC option so that data is only allowed when the machine is trusted.
And if the battery is dead?
If so, them multiply all the times by 3 and you'll get a pretty good idea on how long the GrayKey will take to crack an iPhone.
On the bypass of this feature: If I had sufficient funds, I would use a farraday cage to block any outside cellphone signal. I would then setup a GSM cell within that cage together with the phone in question.
You don't need to fool the phones NTP (does it really have NTP, I doubt it), just make sure you send the time signal in the GSM network, that is picked up by the phone.
Yes, you as a users can turn that off too, but that would stop the phone from auto updating the time, and realizing you moving time zones which would be sort of a pita, so it would be safe to assume most people won't turn that feature off.
I would assume that iOS limits the amount of time you can move backwards so you wouldn't be able to just tell the phone it has gone back a week or more in time, that kind of checks is probably in place. But, if you make the phone completely out of power so the RTC stops, then the phone would have no other option than to believe the time signal coming via the GSM network as soon as it connects, and the phone does connect to whatever GSM network it is let into as soon as it's powered on so that emergency calls can be made, and if the RTC has stopped it will use AT-commands to the GSM-modem to acquire network time data and set the RTC, which then can be at an arbitrary time and date of your choosing.
This is bad news for Apple then..
There is an option in FaceID with selects whether you need to be looking at your phone directly or not.I think you have to look at it. If you keep your eyes closed, it will not unlock; if they try to hold your eyes open, the biometrics will be wrong.
I use Apple maps. Don’t even gave google maps installed.Don't go online either. MacRumors and nearly every other site use Google Analytics, which means everything you're doing is being recorded. What pages you visit, what links you click, how long you're on each page, and much more. All recorded to a nice tidy profile about everything you're doing. And then you use Google Maps to get directions and the GPS functionality so they know where you went and when.
Exactly my thinking. Should be a user changeable setting.Nice! Now would be even nicer if it was shorter then 7 days. 1 day is fine with me. A couple of hours would be fine with me too.
A six digit passcode (numbers) can be cracked by the GrayKey device (Cracker?) in 11-22 hours. Plenty of time for them to get into the phone (they've now got 7 days with iOS 11.4).
But an 8 digit passcode can't be cracked in under 46 days, so the Cracker won't be able to get in.
An eight digit passcode is easy enough to remember--- BUT if you want to use 8 digits, you've got to choose the "alphanumeric password" option in settings. This will unfortunately default to the keyboard on password entry which is a royal pain because the keyboard keys are so small.
Apple now needs to let us use the normal big button passcode keypad for more than 6 digit passcodes. Then we'll be set.
What's the problem? They caught the people.
It would seem those here think this will protect them in some way. In reality it's most likely to cause only them issues. In most cases, agencies are already well at work on a phone within 7 days, most often within hours of acquiring it.
My password is something like:Bold: Wrong
It can be cracked in 1 second even, chance that happens is like 0.00000000000....1 % but it is possible.
Most likely it will take much loner though.
Example: I have a 1 digit password, so, 0-1-2-3-4-5-6-7-8-9, it takes 1 second for each password so the maximum amount to crack this is 10 seconds, yet if my password is lets say 5 and the first attempt is 5 it only takes 1 second to crack.
You might not know but this is illegal in most countries.
An unintended downside: imagine you have a close friend or family member pass away. You/their family want to access their devices afterwards for photos, remembrance, information about their final days, etc. Absent the biometric and passcode (which I am assuming you don't have) you will need the cord access to get in. With a billion devices out there, I am thinking this will happen more frequently than the law enforcement access it is intended to prevent.
And to anyone who wonders why this would even be necessary, I submit you have not suddenly lost a loved one. Not uncommon to go looking for answers or solace in their devices, notify friends of the passing, etc. Asking people to try to get in there within 7 days isn't always realistic or feasible.
That’s not really a smart question to ask y’know. My first thoughts instantly swung to bank details, personal information like addresses of friends and family members, some of whom might be living in protection or be vulnerable. In addition in my case I don’t want people finding out business receipts, my planner as it would indicate when the house is empty, photos of my partner and kids, home video footage that could be used by that “ai fakes” thing to cause any kind of personalized mayhem.....After reading all the comments... WHAT SORT OF STUFF ARE YOU ALL HIDING IN YOUR PHONES?
What are you so scared of?
And how do you do this without unlocking?
You might be able to set up a MITM NTP server that feeds the wrong time (off by several days), but smart NTP clients won't actually accept such a lie, so this probably wouldn't work.
Huh???
That setting is on by default... allowing manipulation (potentially) if your phone is taken.
I am saying you, the person that owns it, now before it is taken, turn that setting off so it can't be used to manipulate the date/time while locked or attacked.
Also, I am not 100% sure how iPhones get their time info when that setting is on, but the options are:
A) From the cell network (non GSM only, i.e. CDMA (Verizon, Sprint))
B) GPS
C) NTP server
All I know is with that setting off, the phone date and time won't auto-set to whatever is represented as the current date and time no matter method.
An unintended downside: imagine you have a close friend or family member pass away. You/their family want to access their devices afterwards for photos, remembrance, information about their final days, etc. Absent the biometric and passcode (which I am assuming you don't have) you will need the cord access to get in. With a billion devices out there, I am thinking this will happen more frequently than the law enforcement access it is intended to prevent.
And to anyone who wonders why this would even be necessary, I submit you have not suddenly lost a loved one. Not uncommon to go looking for answers or solace in their devices, notify friends of the passing, etc. Asking people to try to get in there within 7 days isn't always realistic or feasible.
Why even have a delay at all? Aside from charging (and it should be easy to disable data communication over the port while still allowing the phone to be charged), I can't think of a reason why I'd want the lightning port to work when my phone is locked. I'm ok with having to always unlock my phone anytime I connect it to anything.
On a related note, I completely agree that 7 days is too long. I'd want it to be on the order of hours or a max of 1 day.
Well played Apple, why not take it one step further and have a trusted Mac / PC option so that data is only allowed when the machine is trusted.
Plenty of police activities are illegal in most countries, including owning or carrying guns.You might not know but this is illegal in most countries.
Ah, I was wondering if they had something like that. But how frequently does iOS check the NTP server? If it's 15 minutes or less, you can keep the phone at the same time forever or go backwards slowly.Crypto, too (I’m not sure if macOS is configured to require it, but it’s an option according to the manpage), but I meant the maximum offset between client and server time:
That’s just a little over 15 minutes. So regardless of crypto, you can’t just force a several-days adjustment onto the client. (Assuming macOS doesn’t disable this.)
(edit) It should be noted that that was the manpage for ntpd, which macOS doesn't actually use. It uses timed, which works differently. It's reasonable to assume that timed has similar precautions.