Seems they could/should only support Bluetooth, and only devices that are already paired when unlocked. Lightning is a much much bigger attack surface.
-
-
I’m sorry - I didn’t mean to be condescending.
-
Apology accepted. Idea above is that you can (modulo very different classes of attack) assume the OS is uncompressed as long as the interface surface to it is mostly or entirely cut off.
-
The interface meaning the message passing system between OS and hardware DMZ? Or between OS and user?
-
Between OS and attacker. Interesting case is when phone is already locked & has (hypothetically) disabled data on the port.
-
The thing is, the OS has to do all kinds of stuff when locked: LTE, wifi, bluetooth, GPS, reminders, push notifications, polling for email/calendar invites. I think the idea of a meaningful boundary is impractical.
-
Yes, but those have not been historic sources of OS-compromising remote vulnerabilities on iOS, have they?
-
Oh god yes they have. The NSA had a couple nice ones.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.