There's no reason the data lines couldn't be electronically gated to a dumb charging controller chip while locked. Would eliminate non-invasive physical attacks.
Apology accepted. Idea above is that you can (modulo very different classes of attack) assume the OS is uncompressed as long as the interface surface to it is mostly or entirely cut off.
-
-
The interface meaning the message passing system between OS and hardware DMZ? Or between OS and user?
-
Between OS and attacker. Interesting case is when phone is already locked & has (hypothetically) disabled data on the port.
-
The thing is, the OS has to do all kinds of stuff when locked: LTE, wifi, bluetooth, GPS, reminders, push notifications, polling for email/calendar invites. I think the idea of a meaningful boundary is impractical.
-
Yes, but those have not been historic sources of OS-compromising remote vulnerabilities on iOS, have they?
-
Oh god yes they have. The NSA had a couple nice ones.
End of conversation
New conversation -
-
-
Lightning port is by far the biggest attack surface while the phone is locked without physically opening or damaging the phone.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.