this post was submitted on 18 Jul 2024
68 points (100.0% liked)

Apple

17448 readers
186 users here now

Welcome

to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!

Rules:
  1. No NSFW Content
  2. No Hate Speech or Personal Attacks
  3. No Ads / Spamming
    Self promotion is only allowed in the pinned monthly thread

Lemmy Code of Conduct

Communities of Interest:

Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple

Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode

Community banner courtesy of u/Antsomnia.

founded 1 year ago
MODERATORS
 
top 6 comments
sorted by: hot top controversial new old
[–] atro_city@fedia.io 4 points 3 months ago

Only a matter of time, isn't it? Was a Saudi prince hacked just by getting a text message?

[–] Nogami@lemmy.world 2 points 3 months ago
[–] cheese_greater@lemmy.world -4 points 3 months ago (1 children)

Doesn't Cellebrite just do what anybody with two eyes and a camera can do when an iPhone is already unlocked?

[–] breadsmasher@lemmy.world 2 points 3 months ago (1 children)
[–] cheese_greater@lemmy.world 3 points 3 months ago (1 children)

I wonder if its mostly for simple PIN-passcode types...

Think about it: if they have some bullshit way to disable the anti-replay whatever, its only a matter of time till you iterate to the correct numerical passcode.

Its like Michael said to Jim and Dwight, its not about more or less money, the amount is just different

[–] narc0tic_bird@lemm.ee 6 points 3 months ago

From what's known most of the attack vectors involve brute forcing the passcode and the vulnerabilities allow it without rate limiting/anti-replay.

So you're at least much better off with a long alphanumeric passphrase.