After everyone realizes they will lose all their 32 bit free & other games, they will realize that IOS 11 is as Steve Jobs once said, "A Bag of Hurt."
If hacked yes.
A hundred times this. I have to deal with people like this all day in 'IT departments'Glad you're not in my 'server room fixing my tubes' if you are truly involved in corporate IT. Setting up an AP in your friends coffee shop doesn't count and neither does fixing your parents router.
I change my password a few times a year, and this will work awesome for me, so when my Son comes to visit from school or friends and family visit, I can just grant them access as opposed to trying to remember it and then typing it in on x amount of devices that come with them.
If my Brother visits with his family(of 4), that's at least 10 devices that I'm gonna get hit up for the WiFi password. Great solution.
I was an early commenter on the 9-5 site story and had the exact same concern. Folks that type their p/w into another partie's Apple device probably have no clue that the WiFi Keychain is accessible and readable on the Mac.This is not secure at all. For example, if the person has activated iCloud Keychain, the Wifi password may be synced to a Mac where it can simply be viewed in Keychain Access.
Yup.
I don't disagree, but there are certainly scenarios where this might be useful (i.e. to quickly share the password for a public Wifi, or even between your own devices if you don't want to use iCloud Keychain).Security-wise, I think this is a very bad feature, a close second to Windows IIRC abandoned automatic crowd sourced WiFi network p/w sharing scheme.
Just to be clear, the fundamental problem is not that you can view passwords in Keychain Access on a Mac. If you share a password with someone in a form that they can actually use it, they obviously have to be able to access it in some way, and thus they can also find ways to view it and share it. As someone else wrote, at best the password can be obfuscated on the receiver's device, but that is not real security. Even if Keychain Access didn't exist, there are other ways to extract a password that is stored on your own device (e.g. from an encrypted iTunes backup). If you don't want someone to be able to view and share your password, don't share it with them in the first place, be it manually or through some fancy sync feature.If Apple proceeds, they need to warn the sharing party that their p/w can be exposed via the Mac WiFi Keychain route. Otherwise they do a tremendous disservice to their customer's security.
I triple click home and use guided access if handing someone my phone to see something.The first thing my friend said: "So as long as I have access to your phone I can get your wi.." and I said: "if you have access to my phone, you basically have access to keychain, that's why I don't give people my phone until Apple puts a guest account in iOS"
This, to me, is the big question. Otherwise it just saves a bit of time but has minimal security impact (other than allowing you to use complex passwords without having to worry about needing to enter them.So is it visible in keychain if you do it this way or is it hidden like a password provided by a profile would be?
So, how do you give the photos app to someone who should just see a handful of pictures from one album, with guided access they have access to every album, actually .. all videos, memories, face recognition album, etc.I triple click home and use guided access if handing someone my phone to see something.
I haven't had 2 devices on iOS11 yet, because i rather want a 100% guarantee SOS emergency works just fine (and i dont want to find out after the fact haha)This, to me, is the big question. Otherwise it just saves a bit of time but has minimal security impact (other than allowing you to use complex passwords without having to worry about needing to enter them.
What do you mean ‘permanently’? People tend to use this feature when something changes/goes wrong their their Network Configuration. It works exactly like it should.How about they actually make "Forget this Network?" last permanently, like it should?![]()
Then don’t share it with whoever wants itNo thanks,the people that need my wifi password already know it. What's wrong with just write it on a piece of paper,or type it on their devices myself,as I usually do? I don't want my password spread to whoever want it.
My 5s is on ios 11, do only one device at the moment to test. But I have to believe Apple has some controls around this feature. But in the end it's no different than telling someone the password.I wonder how this would work at a large conference (thousands of people). I'd quickly get annoyed if my iPhone were to offer to share the password every time someone new turned up.
I'm also unable to test it, but the original article implies that the "joining" phone will automatically "ask" for the password without any user intervention. That's different from actually choosing to ask.My 5s is on ios 11, do only one device at the moment to test. But I have to believe Apple has some controls around this feature. But in the end it's no different than telling someone the password.
It would only be an issue if you were standing by the entrance and yours was the first phone the attendees' phones see, otherwise it'd just pick some other random person's phone.I wonder how this would work at a large conference (thousands of people). I'd quickly get annoyed if my iPhone were to offer to share the password every time someone new turned up.
People apparently don't comprehend very well. If a iPhone request a password from another device, the owner of the other device must approve of sending the password.
What? There is no trust. You're at home preparing for guests. People turn up and want to connect to your guest WiFi. Instead of telling them the password (or taking their phone and typing it in for them) you now enable bluetooth and wave your phone near theirs and wait for your phone to prompt you to send the password.If you "trust" a device, why should there be approval?... If u must prompt the user to allow or not, u are also not trusting it in the first place, because of the prompt, there is concern etc.. "trust" would imply trusting 2 factor verification based website like Gmail account for 30 days.. And for 30 days u will not need to enter a verify.
Difference is if a production release wigs out your device in renders it in operable and you're still under warranty Apple will swap it. If they are able to discern that you're using beta software you signed off that you get nothing therefore they be completely within their rights to tell you to kick rocks. They'll tell you to dfu it back to the latest public releaseEven production releases can wig out your device. Not as likely, but it still can.
Even production releases can wig out your device. Not as likely, but it still can.