Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

yeah the definitely not as succinct as it could be. They all seem to pad out content with the same generalities. But fair enough, there is no foolproof solution looks like


Leave your phone at home. You won't need it if you plan to not have it. A simple device like this can even keep it company for you while you're away:

https://fr.wikipedia.org/wiki/Tourne-montre

Print this out and you can take notes on the back of the page, or even read it if you get bored while you're out and about without your device, to remind yourself why you don't really need your phone:

> Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

> Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick

https://arxiv.org/abs/2205.06114 | https://doi.org/10.48550/arXiv.2205.06114

Previously on HN:

When Wireless Malware Stays on After Turning Off iPhones [pdf] - https://news.ycombinator.com/item?id=31364849 May 2022 (5 comments)

You might have already heard about this news from Mental Outlaw:

iPhones Could Still Be Attacked (Even When Powered Off) - https://www.youtube.com/watch?v=mwrjT8hxGzM


I can't emphasize this enough: it is extraordinarily rare for malware to persist after a reboot on iOS. These examples are of devices that faked the shutdown sequence (in other words, the exploit did not achieve persistence). iPhones have a hardware-level reset capability: quickly press volume up, volume down, then press and hold the power button.

Enable Lockdown Mode to prevent the vast majority of exploits, then reboot using this method once a week. You'll be fine, as far as this specific threat is concerned.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: