TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Securing a travel iPhone

216 pointsby jsudhamsalmost 9 years ago

19 comments

FiloSottilealmost 9 years ago
Hey, author here. Happy to answer questions. There&#x27;s also a big Twitter thread here <a href="https:&#x2F;&#x2F;twitter.com&#x2F;FiloSottile&#x2F;status&#x2F;750273921568485377" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;FiloSottile&#x2F;status&#x2F;750273921568485377</a><p>To frame the post and the conversation, I am targeting a loose but not universal threat model. If threat of deadly force is higher up in your risk scale than shoulder-surfing, or Apple cooperation is a given, then you might want to make very different choices, but more importantly, you probably need better advice than a blog post.<p>The only things I want to add are pair-locking, maybe a forced VPN profile, and a correction on how to check the Whatsapp fingerprint. You can find all these things in the Twitter thread.
评论 #12059023 未加载
评论 #12061012 未加载
Razenganalmost 9 years ago
As someone in a country with a serious mugging problem and having lost an iPhone already, one of the biggest security flaws I see is being able to power it off without providing any authentication.<p>What is even the point of Find my Phone and all that if anyone can just instantly switch off all the tracking?? You can&#x27;t even ring your own number after that, and even law enforcement cannot look up the cell tower logs to see where it&#x27;s been.<p>There should be an option to require a passcode for power-off, and another option to periodically send Find my Phone tracking even when &quot;powered off,&quot; via any available network, until the battery dies.<p>EDIT: I agree they can just take out the SIM and we need to be able to force-power-off anyway.. but what can be done to increase the recoverability of these expensive items?
评论 #12058435 未加载
评论 #12060159 未加载
评论 #12058607 未加载
评论 #12058230 未加载
评论 #12058299 未加载
评论 #12058559 未加载
评论 #12058784 未加载
评论 #12058330 未加载
评论 #12061089 未加载
smartbitalmost 9 years ago
What I miss in this article in using MDM to harden an iOS devices in the first place. Eg. you can prevent the ability to make backups [0] diminishing that as a route to exfiltrate information. Secondly an always-on VPN [1] to a fixed IP address prevents network information leakage from the moment the device is turned on the first time. A quick search resulted in these two links but I didn&#x27;t hit a comprehensive guide, other than Apples MDM docs, combining this travel guide combined with iOS MDM hardening.<p>[0] <a href="https:&#x2F;&#x2F;community.rapid7.com&#x2F;community&#x2F;infosec&#x2F;blog&#x2F;2015&#x2F;11&#x2F;26&#x2F;reduced-annoyances-and-increased-security-on-ios-9-a-win-win" rel="nofollow">https:&#x2F;&#x2F;community.rapid7.com&#x2F;community&#x2F;infosec&#x2F;blog&#x2F;2015&#x2F;11&#x2F;...</a><p>[1] <a href="http:&#x2F;&#x2F;www.howtogeek.com&#x2F;218851&#x2F;how-to-enable-always-on-vpn-on-an-iphone-or-ipad&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.howtogeek.com&#x2F;218851&#x2F;how-to-enable-always-on-vpn-...</a>
mehrdadaalmost 9 years ago
A key step missing is to set up the iOS device as Supervised in Apple Configurator and <i>prevent pairing with non-Configurator hosts</i>. Additionally, you can install your own non-removable profile via Configurator on the device disabling a bunch of privacy-damaging features there.
spdustinalmost 9 years ago
I think two security related changes could be made to iOS that would benefit many people.<p>1) PIN&#x2F;TouchID locking of contacts, like you can do with notes. Don&#x27;t allow messages and emails to and from the contact to be decrypted from the encrypted store without authenticating, like you can now do with notes. Would help with securing communications with legal counsel or other privileged parties from being captured.<p>2) A &quot;duress&quot; PIN&#x2F;TouchID registration; if I unlock my phone with a duress code or imprint my duress-coded fingerprint, reboot the phone (to look like it was a glitch-induced reboot) and present the PIN prompt again. Auto-wipe the phone if the duress code is given again this second time.
评论 #12058850 未加载
评论 #12058748 未加载
joshavantalmost 9 years ago
I thought I once read that, since Touch ID relies on fingerprints, a US court order can compel you to provide those, thus forcing you to unlock an iPhone in question.<p>This, as opposed to a passcode-only configuration, which a court order cannot compel you to give (I believe since this would fall in the category of &#x27;forcing you to testify against yourself&#x27;).<p>If that is indeed the case, I imagine it would make better sense to leave Touch ID disabled, unlike what this article suggests.
评论 #12057923 未加载
评论 #12057905 未加载
评论 #12058285 未加载
评论 #12058354 未加载
评论 #12057757 未加载
spraakalmost 9 years ago
Related, are there any guides for securing a laptop for travel?
secfirstmdalmost 9 years ago
Nice guide. Just some other OPSEC stuff we have done for occasional problems in the field training human rights defenders and journalists (who needed specific solutions)...<p>You can always use a call relay. So you can give people one phone number that relays to your own real number (for voice calls) - although an voice call is obviously more vulnerable than Signal call etc.<p>Ditto, AFAIK there is the ability to setup a relay for SMS through an Android. I can&#x27;t remember the app but basically people could SMS that number and it relays to you real number.<p>Before people jump on me, yes I am aware of the weaknesses of both of the above but sometimes a specific type of threat model requires these two tricks. I recommend it unless you are aware of the trade offs.
walterbellalmost 9 years ago
The OP has responded to questions on Twitter, including TouchID criticism, <a href="https:&#x2F;&#x2F;twitter.com&#x2F;FiloSottile&#x2F;status&#x2F;750273921568485377" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;FiloSottile&#x2F;status&#x2F;750273921568485377</a>
sly010almost 9 years ago
I was once mugged for a crappy Nokia feature phone. I had a prepaid sim for a long time. Very hard to replace (in Hungary) without loosing the phone number. I managed to convince my muggers to let me take the SIM.<p>Ironically they got caught and I got the phone back.
xnzakgalmost 9 years ago
<a href="https:&#x2F;&#x2F;xkcd.com&#x2F;538&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;538&#x2F;</a><p>Well, at least it prevents the thieves from doing more damage if it&#x27;s stolen.
b15h0palmost 9 years ago
About turning off iCloud backup: You say that messages are being stored unencrypted. That may be true as we do not know what happens on Apple servers. But this is about securing the phone for traveling i.e. you would have to worry about the transport. And I would strongly guess that backup traffic would happen with http, probably with pinned certificates.
shurcooLalmost 9 years ago
If I may ask, in what circumstances would one want to go this far in securing their travel phone? Is this meant to be for a &quot;general trip somewhere&quot;, or something more specific?
st3fanalmost 9 years ago
I also like to power off&#x2F;on my phone at airports. So that it will be on (which you have to show sometimes) but requires the passcode to unlock.
fhoodalmost 9 years ago
I would put extra emphasis on don&#x27;t use wifi. Preferably ever.
评论 #12058024 未加载
r00fusalmost 9 years ago
Does any of this avoid the pitfall of a stingray device[1]? Is there any way to prevent 2G?<p>[1] <a href="https:&#x2F;&#x2F;epic.org&#x2F;foia&#x2F;fbi&#x2F;stingray&#x2F;" rel="nofollow">https:&#x2F;&#x2F;epic.org&#x2F;foia&#x2F;fbi&#x2F;stingray&#x2F;</a>
评论 #12058994 未加载
peteretepalmost 9 years ago
No VPN? I&#x27;m using Freedome and I like it.
rdslwalmost 9 years ago
It&#x27;s also an ultimate checklist of potential vector attacks.
ape4almost 9 years ago
I would have thought a rooted Android or Ubuntu phone would more secure (done right).
评论 #12058563 未加载
评论 #12058428 未加载
评论 #12060523 未加载