<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>iOS 11.4.1 Archives - Iran News Daily</title>
	<atom:link href="https://irannewsdaily.com/tag/ios-11-4-1/feed/" rel="self" type="application/rss+xml" />
	<link>https://irannewsdaily.com/tag/ios-11-4-1/</link>
	<description></description>
	<lastBuildDate>Mon, 16 Jul 2018 06:30:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.4</generator>

<image>
	<url>https://irannewsdaily.com/wp-content/uploads/2020/04/cropped-iranlogo-32x32.png</url>
	<title>iOS 11.4.1 Archives - Iran News Daily</title>
	<link>https://irannewsdaily.com/tag/ios-11-4-1/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>New iOS Security Feature Ripe for Defeat</title>
		<link>https://irannewsdaily.com/2018/07/new-ios-security-feature-ripe-for-defeat/</link>
					<comments>https://irannewsdaily.com/2018/07/new-ios-security-feature-ripe-for-defeat/#respond</comments>
		
		<dc:creator><![CDATA[reporter 1222]]></dc:creator>
		<pubDate>Mon, 16 Jul 2018 08:30:36 +0000</pubDate>
				<category><![CDATA[technology]]></category>
		<category><![CDATA[iOS 11.4.1]]></category>
		<category><![CDATA[iphone]]></category>
		<guid isPermaLink="false">https://irannewsdaily.com/?p=31828</guid>

					<description><![CDATA[<p>A new feature in iOS 11.4.1, which Apple released earlier this week, is designed to protect against unwanted intrusions through the iPhone&#8217;s Lightning Port. However, the protection may be weak at best. The feature, called &#8220;USB Restricted Mode,&#8221; disables data transfer through the Lightning Port after an hour of inactivity. A password-protected iOS device that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2018/07/new-ios-security-feature-ripe-for-defeat/">New iOS Security Feature Ripe for Defeat</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="story-body">A new feature in iOS 11.4.1, which Apple released earlier this week, is designed to protect against unwanted intrusions through the iPhone&#8217;s Lightning Port. However, the protection may be weak at best.</p>
<p>The feature, called &#8220;USB Restricted Mode,&#8221; disables data transfer through the Lightning Port after an hour of inactivity.</p>
<p>A password-protected iOS device that has not been unlocked and connected to a USB accessory within the past hour will not communicate with an accessory or computer, and in some cases might not charge, according to Apple. Users might see a message directing them to unlock the device to use accessories.</p>
<p>One possible use for USB Restricted Mode could be to foil passcode-cracking solutions made by companies like Cellebrite and Grayshift, which reportedly have been used by law enforcement authorities to crack iPhones.</p>
<p>Users can turn off the USB Restricted Mode capability if they desire to do so.</p>
<div class="story-advertisement">
<h2 class="subhead">Thwarting Data Port Intruders</h2>
<p>Although the Lightning port may be a sweet spot for law enforcement, USB Restricted Mode has a broader purpose than protecting users from police probes, maintained Will Strafach, president of Sudo Security Group, an iOS security company in Greenwich, Connecticut.</p>
<p>&#8220;Exploits and vulnerabilities can be seized on by anyone,&#8221; he told TechNewsWorld. &#8220;Criminals may want to steal data from the device or wipe it, so this mode is for mitigation of any kind of USB-based vulnerability.&#8221;</p>
<p>USB Restricted Mode is &#8220;first and foremost&#8221; designed to protect its users&#8217; phones and data, maintained Andrew Blaich, head of device intelligence at Lookout, a maker of mobile security products in San Francisco.</p>
<p>&#8220;Law enforcement has recently been using new tools, such as GrayKey, to guess the passcode of a device to access it,&#8221; he told TechNewsWorld.</p>
<p>However, the vulnerabilities and technical bypasses used by GrayKey &#8212; and by solutions from Cellebrite and others &#8212; are still unknown, he pointed out.</p>
<h2 class="subhead">Smart Approach</h2>
<p>The code GrayKey uses to break the passcode on an iPhone is a closely held secret, but it appears to load through the Lightning Port.</p>
<p>&#8220;So Apple&#8217;s idea is to make a user enter a passcode after an hour. Otherwise the Lightning Port can only be used for power,&#8221; said Sudo&#8217;s Strafach.</p>
<p>&#8220;Without a data connection, there&#8217;s no way to communicate with the data services running on the phone, so there&#8217;s no way to access any vulnerabilities on the phone,&#8221; he explained.</p>
<p>&#8220;Instead of trying to address individual vulnerabilities, Apple is addressing a whole class of vulnerabilities that need the data link to be exploited,&#8221; Strafach pointed out.</p>
<p>&#8220;That&#8217;s smart,&#8221; he said. &#8220;It&#8217;s taking a long-term outlook on vulnerabilities. Rather than squashing vulnerabilities as they come up, they&#8217;re taking a proactive approach and mitigating the method by which these vulnerabilities are exploited.&#8221;</p>
<h2 class="subhead">Breaking Restricted Mode</h2>
<p>Once USB Restricted Mode is engaged, it appears to be impossible to break, so the key to foiling the security measure is to prevent it from engaging.</p>
<p>Oleg Afonin, a security researcher at ElcomSoft, has described exactly how to do that in an online post.</p>
<p>&#8220;What we discovered is that iOS will reset the USB Restrictive Mode countdown timer even if one connects the iPhone to an untrusted USB accessory, one that has never been [connected] to the iPhone before,&#8221; he wrote.</p>
<p>If USB Restricted Mode hasn&#8217;t been engaged, a police officer can seize an iPhone and immediately connect a compatible USB accessory to prevent the USB Restricted Mode lock from engaging after one hour, he explained. Then the device can be taken to a location where a passcode cracker can be used.</p>
<p>What&#8217;s the likelihood that a phone hasn&#8217;t been unlocked within an hour of it being seized by a law enforcement agent? Quite high, according to Afonin, who noted the average user unlocks a phone around 80 times a day.</p>
<p>Apple did not respond to our request to comment for this story.</p>
<p>&#8220;Nothing is a silver bullet,&#8221; warned Lookout&#8217;s Blaich.</p>
<p>&#8220;There is no perfect solution, but it&#8217;s best to assume that if someone has physical access to your phone, they will eventually be able to find a way to get in,&#8221; he said. &#8220;So users need to remember to use a strong passcode to minimize unintended access when they lose possession of their device.&#8221;</p>
</div>
<p>The post <a rel="nofollow" href="https://irannewsdaily.com/2018/07/new-ios-security-feature-ripe-for-defeat/">New iOS Security Feature Ripe for Defeat</a> appeared first on <a rel="nofollow" href="https://irannewsdaily.com">Iran News Daily</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://irannewsdaily.com/2018/07/new-ios-security-feature-ripe-for-defeat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
