Huh, you have a valid point. I haven’t tried it yet, but it probably doesn’t access/unencrypt too much more than the regular lock screen, given thats its just a glorified alarm clock with notifications. Ironically, some of the most private stuff (photos, notes) don’t have CompleteProtection, so that’s a current gaping vulnerability. And yes, if the FBI really wants your data, there are RAM reading tools for iPhone.
I think the main important thing is to ensure USB accessories are disabled and also to allow for automation actions that don’t require user confirmation like shutdown and reboot that can be triggered by actions like connecting a charging cord
Yeah, unfortunately iPhones don’t have a option to ask each time a USB cable is plugged in (has to unlock first), which is a feature I love in macOS. You can turn on a feature disabling USB Data after an hour of not unlocking on iOS though, which I do.
Huh, you have a valid point. I haven’t tried it yet, but it probably doesn’t access/unencrypt too much more than the regular lock screen, given thats its just a glorified alarm clock with notifications. Ironically, some of the most private stuff (photos, notes) don’t have CompleteProtection, so that’s a current gaping vulnerability. And yes, if the FBI really wants your data, there are RAM reading tools for iPhone.
Here is a stackexchange thread about AFU/DFU/CP if you didn’t know.
I think the main important thing is to ensure USB accessories are disabled and also to allow for automation actions that don’t require user confirmation like shutdown and reboot that can be triggered by actions like connecting a charging cord
Yeah, unfortunately iPhones don’t have a option to ask each time a USB cable is plugged in (has to unlock first), which is a feature I love in macOS. You can turn on a feature disabling USB Data after an hour of not unlocking on iOS though, which I do.
I just wanna recognize your comment. I can’t quite parse it yet but I will