This podcast goes into the reasons that rebooting a locked phone can improve security.
[The 404 Media Podcast] How Apple is Locking Out Cops #the404MediaPodcast podcastaddict.com/…/185990070 via @PodcastAddict
My take is, it’s harder to unlock/hack a phone when it is in the locked state after booting up. This state is somehow different than the booted locked state.
Why, is above my understanding.
truxnell@infosec.pub 15 hours ago
After a reboot all the data is encrypted and needs a pin/fingerprint to unlock. So if it’s stolen (or feds get it) a planned reboot resets it to a highly secure state that is much more difficult to hack into than when it’s just locked from timeout.
n2burns@lemmy.ca 14 hours ago
Just to clarify, it needs a PIN/password to unlock after reboot. Biometrics like fingerprint aren’t available until the device has been decrypted.
truxnell@infosec.pub 5 hours ago
Thanks for the clarification, I forgot that (somehow)
Sibshops@lemm.ee 14 hours ago
Oh, this is actually a useful feature, then.
truxnell@infosec.pub 5 hours ago
Yeah, seems like its a move to follow apple after custom ROMS offering it as a security feature (Im on GrapheneOS and had it set for a while)
lol@discuss.tchncs.de 12 hours ago
Why is a reboot necessary for that? Is it not possible to enter the same encrypted state the phone is in after a reboot without actually rebooting?
Darkassassin07@lemmy.ca 12 hours ago
Much of the data on your phone, including critical information that’s required to run the operating system and make the device function, is fully encrypted when the device is off/rebooted.
While in this locked down state, nothing can run. You don’t receive notifications, applications can’t run in the background, even just accessing the device yourself is slow as you have to wait for the whole system to decrypt and start up.
When you unlock the device for the first time; much of that data is decrypted so that it can be used, and the keys required to unlock the rest of the data get stored in memory where they can be quickly accessed and used. This also makes the device more vulnerable to attacks.
There’s always a trade off between convenience and security. The more secure a system, the less convenient it is to use.
lol@discuss.tchncs.de 7 hours ago
I’m generally aware of all that, but I don’t see how it answers the question. Why can’t you just stop all app processes, unmount the relevant partition(s), clear any memory containing cryptographic keys etc. but not actually reboot?
Rebooting just seems like a very roundabout, slow and inefficient way to get back to that initial state you describe.