- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
If the phone saves its state before rebooting, why would that help? It will still be accessible after the reboot. What’s the attack vector?
Features like this exist for putting the phone back at rest when there hasn’t been a successful unlocking for X hours – GrapheneOS, an Android OS, has a similar feature. The objective is to limit the window of time an attacker has to try to exploit anything the phone may have in operation during a not-at-rest state (when the user is still ‘logged in’ to the phone, certain background services / features may be available to exploit).
Rebooting automatically, especially if the phone not has not been successfully unlocked recently, may place the phone in a less exploitable state, as those services / features might not be available without logging in first.
We already know that Israeli cyber company has spyware called pegasus, that can 0-click attacks to ios and Android. It is one time hack, and it is removed on boot. They sell it as service. This is why cyber security centers recommend boot once a day.
They had spyware, anyway. We don’t know that it still works.
As of March 2023, Pegasus operators were able to remotely install the spyware on iOS versions through 16.0.3 using a zero-click exploit.
The current version of iOS is 18.1.0.
We won’t know what they have now until it is exposed after usage though.
anyone knows how to accomplish similar with LineageOS? I had a programmable power off and on timer ona Samsung S3 a long time ago, but that’s missing from the current builds.