Yes but that logic has no need to interact with OS or security processor logic. Can be completely isolated.
Between OS and attacker. Interesting case is when phone is already locked & has (hypothetically) disabled data on the port.
-
-
The thing is, the OS has to do all kinds of stuff when locked: LTE, wifi, bluetooth, GPS, reminders, push notifications, polling for email/calendar invites. I think the idea of a meaningful boundary is impractical.
-
Yes, but those have not been historic sources of OS-compromising remote vulnerabilities on iOS, have they?
-
Oh god yes they have. The NSA had a couple nice ones.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.