iOS 11.4: Apple Throws Another Punch at Law Enforcement Agencies
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

iOS 11.4: Apple Throws Another Punch at Law Enforcement Agencies

The ‘USB Restricted Mode’ feature will make it even harder for agencies to hack into iPhones

The never-ending tale of Apple vs. Law Enforcement has just taken another twist. Apple, with its much anticipated (thanks to the iOS 11.3 bugs) iOS 11.4 update, is going to introduce a new feature that should give a collective headache to law enforcement agencies and companies such as Grayshift, the creators of GrayKey—an iPhone unlocking box.

This feature is called ‘USB Restricted Mode.’

USB Restricted Mode, as the name suggests, restricts the access of the iPhone via lightning connector. The way it works is simple yet highly effective in nature. Once an iPhone or an iPad has been updated to 11.4, the USB Restricted Mode disables USB data connection if the device hasn’t been unlocked for a week. The phone will be charged via the lightning connector but won’t be able to establish a USB connection.

“To improve security, for a locked iOS device to communicate with USB accessories you must connect an accessory via the lightning connector to the device while unlocked – or enter your device passcode while connected – at least once a week,” wrote Oleg Afonin of ElcomSoft, a password, and system recovery software provider.

Does USB Restricted Mode really matter?

Hell Yeah!

Let me explain it to you.

Unless you were born yesterday, you’d have heard of the infamous spat(s) between Apple and the FBI. Apple, as a part of its Zero-Knowledge Encryption, doesn’t allow any access to anyone who wants to crack the password and unlock the device. In fact, even Apple cannot break it if it wishes to. But the fortunate or unfortunate (whichever side you’re on) truth about today’s virtual world is that someone will come up with a way no matter how strong the security is.

That’s what Grayshift did with its GrayKey device. This device tries brute-force attacks via USB connection to unlock the device. In simple words, GrayKey tries all sorts of different permutations and combinations to crack the password; it’s an intricate yet super-fast guessing game.

The online version of GrayKey is available for $15,000, and the offline one costs $30,000. Note that not everyone can get GrayKey as only the “right” people and organizations with “legitimate purpose” can get access to it. But I certainly won’t deny the possibility of GrayKey eventually ending up on eBay.

When the news of such a device first came to the surface, it appeared that the likes of the FBI would no longer have to work through a court (they didn’t need to do it anyway) or run to Israeli firms to crack an iPhone – or try to use a dead man’s finger – a palm-sized box is all they’d need.

However, Apple seems to have other ideas.

The USB Restricted Mode won’t let devices connect if the phone hasn’t been unlocked in seven days. So, the device has a limited timeframe to weave its magic. iPhone or iPad will go in the no-response state if a week passes without getting unlocked.

It still might not matter

Don’t get your hopes too up as this feature is still being tested in the beta version of iOS 11.4. It was also a part of the iOS 11.3 beta but was later removed in the stable 11.3 release. So, that possibility is always there. Even if USB Restricted Mode isn’t a part of the software update, iPhone users will welcome 11.4 with open arms as the 11.3 bugs have left many of them frustrated.

iOS 11.4 can’t come soon enough!

Author

Jay Thakkar

After graduating from university with an engineering degree, Jay found his true passion as a writer…specifically, a cybersecurity writer. He’s now a Hashed Out staff writer covering encryption, privacy, cybersecurity best practices, and related topics.