Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
The problem is that enforcing the "complete protection" at all times would result in you having to enter your password every time you use your phone. Nor would the phone be able to perform background operations whilst it was locked - such as check email, accept incoming notifications etc. The impact is not about a couple millisecond delay as users start using the phone - but real changes to the user experience.

All of security it a balance between privacy and convenience; I think Apple's balance in iOS is pretty good - and appropriate for something like 99.5% of the users out there.
Yah I was afraid it would have an impact on those services, not knowing you got a call/notification until you unlock the phone again would make the phone way less useful for many persons.
 
The problem is that enforcing the "complete protection" at all times would result in you having to enter your password every time you use your phone. Nor would the phone be able to perform background operations whilst it was locked - such as check email, accept incoming notifications etc. The impact is not about a couple millisecond delay as users start using the phone - but real changes to the user experience.

All of security it a balance between privacy and convenience; I think Apple's balance in iOS is pretty good - and appropriate for something like 99.5% of the users out there.

There's this thing called asymmetric encryption, it's been around for a very long time. New emails can be fetched and encrypted while the phone is locked. Notification events would likewise be fine too, as their associated blurbs could be stored in RAM (compressed, even), associated via GUID and stored with an encrypted cache so if power is lost, the next unlock would bring them right back up.

A lot more can be under "complete protection" than what is right now without UX changes.
 
The last paragraph is the most important.

The spokesperson also told Wired that Apple's security work is primarily focused on protecting users from hackers, thieves, and criminals looking to steal personal information. They also noted that the types of attacks the researchers highlighted are very costly to develop, require physical access to the target device, and only work until Apple releases a patch. Apple also emphasized that its objective with iOS is to balance security and convenience.

So all you worrywarts out there thinking Apple security is crap need to take chill pill and relax. If you had 100% security you wouldn’t be able to use your device.
Security researchers are bored now that actual scary remote hacks are few and far between. As always, I think ALL security articles should START with wether or not it requires physical access to do. But, then again, most people would stop reading at that point if they did :)
 
I agree. Let the user decide on the encryption level and if the potential performance trade-off is worth it.
Well, not all users understand what encryption is and how it works. It shouldn't be a user option to be very protected or a bit less protected. A user should be allowed to make election only on stuff that are clear to understand and average user would understand the trade off and advantages of each option and you cant explain security and encryption in a simple pop-up window. You can choose to activate Siri, or share analytic data with Apple upon setting up your iPhone or using Face ID and these options makes sense because an average user understands what he is agreeing with. With encryption, probably only 1/10 people can make an informed decision. If you cant make an informed decision, then it is not an option, it is a trap!
 
The biggest problem for me is that Apple planned to make iCloud backups end to end encrypted but this was thwarted.

Thus really even on Apple devices we have little privacy if we use iCloud.

I stopped using iCloud.

Use calDAV for contacts and calendar.
Ditch iMessage. Use Signal instead.
MEGA.nz for cloud storage.
 
  • Like
Reactions: Victor Mortimer
The only cloud you can trust is your own cloud. NASs such as QNAP and Synology are getting very popular with people that don't trust mega-cloud operations. Accessing your own NAS with a VPN is about the best security you're going to get, an no one will be mining your data. Virtually all the storage space you'll ever need and a ton of additional features.
I run nextcloud for photo backups. Apple has made it very annoying to do. I constantly get pop ups that the app is accessing my location data. They do not respect your choice to always allow location data to an app - unless it is their own app.

Nextcloud relies on location movements to trigger checking if there are any new photos to backup. Ideally, Apple could provide an api for that, but they are trying to get everyone to pay for iCloud storage instead. I guess they think if they annoy users enough, then people will switch.
 
The biggest problem for me is that Apple planned to make iCloud backups end to end encrypted but this was thwarted.

Thus really even on Apple devices we have little privacy if we use iCloud.
I‘m all for E2EE iCloud but I get why they didn‘t do it. Imagine the PR nightmare if your data was permanently lost due to e.g. forgetting your password or recovery codes. This is exactly what they talk about in their statement: security vs convenience.
 
While this is true, that’s not the whole story. Your data enters Protected Until First User Authentication also after failed biometric authentication, or 24 hours without biometric authentication if the phone supports that as well. So it does happen more frequently than just after a restart.
Do you mean that the phone enters "Complete Protection" in those cases? Its likely already in "Protected Until First User Authentication" in the situations you mentioned, so I'm guessing you mis-typed.
 
is it possible to hack an iPhone these days?
Without having physical access it’s really hard to hack. It’s so inconvenient, that it’s far easer for hackers to just use social engineering (getting you to unlock your phone, visit a website, enter your credentials, etc.). So, while I believe the researcher, it’s like just finding the hack to walk from NY to LA. Sure, it’s possible, but anyone in NY that wants to get to LA would use any of a number of easier and more successful methods.
 
  • Like
Reactions: sugargliderdude
You don't have to restart your phone. Hitting the power button 5 times in a row forces the phone into the Complete Protection mode as well.
no, unfortunately that doesn't work anymore. you now have to hold the power and one volume button until the shutdown screen appears and then press cancel on screen - that's not something you can do quickly, casually or unnoticed.
 
  • Like
Reactions: freediverx00
So it's been all a lie.
That's worse than using a device that's known to not be secure.

There's zero reason to believe apple's narrative (aka lies) on privacy from here on out.

Just remember: The data on your iPhone and everything you've ever done with it can be accessed by skilled adversaries
 
  • Like
Reactions: Victor Mortimer
The biggest problem for me is that Apple planned to make iCloud backups end to end encrypted but this was thwarted.
IIRC, they did make them end-to-end encrypted and then ran into lots of people who said “I lost my phone / it broke / etc, and I can’t remember my password, so you have to get my data back” who were then furious at Apple that all their data was 100% permanently irretrievable, so Apple ended up toning down the backup security.
 
no, unfortunately that doesn't work anymore. you now have to hold the power and one volume button until the shutdown screen appears and then press cancel on screen - that's not something you can do quickly, casually or unnoticed.
Do you HAVE to press cancel on the screen, though? I think another tap of the power button acts as “cancel” as well.
 
The biggest problem for me is that Apple planned to make iCloud backups end to end encrypted but this was thwarted.

Thus really even on Apple devices we have little privacy if we use iCloud.
Exactly. This is a huge security hole and the concern is that if you use iCloud backups even once some three letter agency or bad actor could capture it if there is a security hole in the cloud - last year there were tons. Then once it is captured, it is accessible at any point later.
What happens on your iPhone stays on your iPhone unless if you use iCloud to backup your iPhone.
I stopped using iCloud.

Use calDAV for contacts and calendar.
Ditch iMessage. Use Signal instead.
MEGA.nz for cloud storage.
 
Here's the gist about (today's digital) security. Everything can be hacked/breached given enough time. The trick is convenience, providing a fair level for the user and unreasonable for the attacker. With a moderate to strong encryption algorithm and a very long password/key, even if it is a chain of words, will require a long time to decrypt. Long enough and it could require weeks to months to process. In which case, hackers will be deterred. It's because of this you see a lot more automated passwords having 50+ characters and being hexadecimal as well as the increased popularity of phishing attacks -- much more efficient to dupe a person than try all of the possible permutations of a key.
 
no, unfortunately that doesn't work anymore. you now have to hold the power and one volume button until the shutdown screen appears and then press cancel on screen - that's not something you can do quickly, casually or unnoticed.
Unless the iPhone 12 is different my 11 shows the shutdown screen after 5 presses. You still have to hit cancel though.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.