The Register: iOS 18 added secret and smart security feature that reboots iThings after three days

Source URL: https://www.theregister.com/2024/11/19/ios_18_secret_reboot/
Source: The Register
Title: iOS 18 added secret and smart security feature that reboots iThings after three days

Feedly Summary: Security researcher’s reverse engineering effort reveals undocumented reboot timer that will make life harder for attackers
Apple’s latest mobile operating system, iOS 18, appears to have added an undocumented security feature that reboots devices if they’re not used for 72 hours.…

AI Summary and Description: Yes

**Summary:** The text discusses a new undocumented security feature in Apple’s iOS 18 that automatically reboots devices after 72 hours of inactivity, entering a more secure state known as Before First Unlock (BFU). This mechanism aims to significantly reduce unauthorized access to stolen devices, enhancing protection for users and altering the threat landscape for both criminals and law enforcement.

**Detailed Description:** The introduction of the inactivity reboot feature in iOS 18 represents a noteworthy innovation in mobile security, specifically within the realm of information security. Here are the major points from the text:

– **Inactivity Reboot Mechanism:**
– Apple’s iOS 18 introduces an undocumented feature that reboots devices after 72 hours of inactivity.
– When rebooted, devices enter the BFU state, where the stored files are encrypted and access is more restricted.

– **Implications for Security:**
– The feature particularly impacts the ability of criminals and unauthorized users to exploit stolen devices.
– AFU (After First Unlock) state poses a greater risk as it allows easier access to files since encryption keys are loaded into memory, making it a preferred target for data access threats.
– This security enhancement serves as a powerful mitigation strategy, as maintaining kernel code execution would be necessary for attackers to bypass the inactivity reboot.

– **Reverse Engineering Insights:**
– Security researcher Jiska Classen explored the implementation of this feature through reverse engineering, confirming its operation.
– The feature was discovered through various investigation techniques, including examining Apple’s Security Enclave Processor and communication logs.

– **Potential Impact on Forensics:**
– The text highlights that forensic analysis tools may face challenges in obtaining data post-reboot, as they can only access limited system data in the BFU state.
– Although forensic analysts might delay the reboot for data extraction, they have a limited window of opportunity (three days) to exploit before the device’s security measures lock them out.

– **Changes in Threat Landscape:**
– Law enforcement efforts must adapt due to new pressure to extract data quickly within the three-day limitation.
– Conversely, the feature could effectively diminish the chances of criminals accessing sensitive information from stolen devices.

In summary, Apple’s implementation of the inactivity reboot presents critical implications for security practices within mobile device usage, significantly enhancing user data protection while reshaping the approach for both security professionals and analysts in handling device forensics.