iPhone ‘Inactivity Reboot’ Feature Restarts Device After 72 Hours, Expert Says

Date:

iOS 18.1 rolled out to users last month with a new security feature that can restart a user’s smartphone if it is not unlocked for three days, effectively securing the data on the device from thieves, according to security experts who tested the feature. A recent report revealed that iPhone units seized for forensic investigation were rebooting on their own, and it was later revealed that the ‘inactivity reboot’ functionality was added as part of the latest iOS update.

How Apple’s ‘Inactivity Reboot’ Works on an iPhone

Last week, security researcher Jiska Classen revealed that Apple had added a new feature called ‘Inactivity Reboot’ that would cause an unattended iPhone to reboot after a certain period. The researcher has now revealed that the feature is activated after three days, along with a demonstration of how it works.

In a video posted on X (formerly Twitter), the researcher showed an iPhone 14 Pro model running on iOS 18.1, which rebooted when it was not unlocked within a 72-hour period. The security feature is designed to limit unauthorised access to a smartphone, when it is not in active use.

When an iPhone is rebooted, it enters a state called ‘Before First Unlock’ (BFU) — this is when the encryption keys used to protect user data are safely stored on the handset’s chipset, in a secure subsystem called the Secure Enclave.

See also  Vivo Phone Spotted on TENAA Could Be Vivo V20; Key Specifications Surface Online

It is much more difficult for someone to gain unauthorised access to the smartphone in the BFU state, compared to ‘After First Unlock’ (AFU), which as the name suggests, is when the phone has been unlocked, and biometric authentication (Face ID or Touch ID) is enabled.

However, the researcher warns that three days (in the AFU state) is enough time for law enforcement to get access to user data, especially when using professional tools or experts. However, it might prevent thieves from getting access to an iPhone using out-of-date tools.

Users can also enable Stolen Data Protection — a feature introduced with iOS 17.3 — that prompts the use of biometric authentication to change important settings on an iPhone. This feature is disabled by default, as it adds more friction to the process of modifying some settings, but users will reportedly be prompted to turn it on when setting up their iPhone with the upcoming iOS 18.2 update.

iOS 18.1 rolled out to users last month with a new security feature that can restart a user’s smartphone if it is not unlocked for three days, effectively securing the data on the device from thieves, according to security experts who tested the feature. A recent report revealed that iPhone units seized for forensic investigation were rebooting on their own, and it was later revealed that the ‘inactivity reboot’ functionality was added as part of the latest iOS update.

How Apple’s ‘Inactivity Reboot’ Works on an iPhone

Last week, security researcher Jiska Classen revealed that Apple had added a new feature called ‘Inactivity Reboot’ that would cause an unattended iPhone to reboot after a certain period. The researcher has now revealed that the feature is activated after three days, along with a demonstration of how it works.

In a video posted on X (formerly Twitter), the researcher showed an iPhone 14 Pro model running on iOS 18.1, which rebooted when it was not unlocked within a 72-hour period. The security feature is designed to limit unauthorised access to a smartphone, when it is not in active use.

See also  Poco X7 Pro Could Be the First Smartphone to Ship With Xiaomi's HyperOS 2 in India

When an iPhone is rebooted, it enters a state called ‘Before First Unlock’ (BFU) — this is when the encryption keys used to protect user data are safely stored on the handset’s chipset, in a secure subsystem called the Secure Enclave.

It is much more difficult for someone to gain unauthorised access to the smartphone in the BFU state, compared to ‘After First Unlock’ (AFU), which as the name suggests, is when the phone has been unlocked, and biometric authentication (Face ID or Touch ID) is enabled.

However, the researcher warns that three days (in the AFU state) is enough time for law enforcement to get access to user data, especially when using professional tools or experts. However, it might prevent thieves from getting access to an iPhone using out-of-date tools.

Users can also enable Stolen Data Protection — a feature introduced with iOS 17.3 — that prompts the use of biometric authentication to change important settings on an iPhone. This feature is disabled by default, as it adds more friction to the process of modifying some settings, but users will reportedly be prompted to turn it on when setting up their iPhone with the upcoming iOS 18.2 update.

 

Share post:

Subscribe

spot_imgspot_img

Popular

More like this
Related

South Carolina prepares for second firing squad execution

A firing squad is set to kill a South...

RRB ALP Recruitment 2025: Apply for 9,970 vacancies from April 12; check selection process and other details here

The RRB ALP Recruitment 2025 application process for 9,970...

‘Gauti (Gautam Gambhir) bhai has helped me understand my potential’

Washington Sundar, a versatile all-rounder, faces the challenge of...

Apple is left without a life raft as Trump’s China trade war intensifies, analysts warn

Apple remains stranded without a life raft, experts say,...