• tias
    link
    fedilink
    arrow-up
    3
    ·
    1 month ago

    If the phone saves its state before rebooting, why would that help? It will still be accessible after the reboot. What’s the attack vector?

    • chirospasm@lemmy.ml
      link
      fedilink
      arrow-up
      16
      ·
      edit-2
      1 month ago

      Features like this exist for putting the phone back at rest when there hasn’t been a successful unlocking for X hours – GrapheneOS, an Android OS, has a similar feature. The objective is to limit the window of time an attacker has to try to exploit anything the phone may have in operation during a not-at-rest state (when the user is still ‘logged in’ to the phone, certain background services / features may be available to exploit).

      Rebooting automatically, especially if the phone not has not been successfully unlocked recently, may place the phone in a less exploitable state, as those services / features might not be available without logging in first.

      • davel [he/him]@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        1 month ago

        They had spyware, anyway. We don’t know that it still works.

        As of March 2023, Pegasus operators were able to remotely install the spyware on iOS versions through 16.0.3 using a zero-click exploit.

        The current version of iOS is 18.1.0.