Reverse Engineering iOS 18 Inactivity Reboot
Overall reception
- Many commenters praise the analysis and see the feature as a significant security improvement.
- Others argue Apple is not “pushing the envelope,” noting similar features existed in hardened Android variants, but acknowledge the impact of a strong default on a billion devices.
How the inactivity reboot works (as discussed)
- The reboot is coordinated by a kernel module, not enforced directly by the Secure Enclave Processor (SEP); SEP appears to request rather than force reboot.
- If the kernel is compromised, attackers could theoretically suppress both the reboot and any panic.
- The feature triggers purely on time since last unlock (AFU duration), not on network connectivity; tests showed reboots after 72 hours even with Wi‑Fi connected, undermining earlier “devices talk to each other” rumors.
Security model: BFU vs AFU and keys
- Core goal is to return the device to “Before First Unlock” (BFU), where user data keys are not in RAM and only available from SEP after passcode/biometric.
- Reboot is seen as the simplest reliable way to: drop keys, clear or invalidate RAM contents, and re-establish a clean chain of trust.
- Commenters discuss iOS data protection classes: some data becomes unavailable whenever locked; others remain accessible until reboot/BFU.
- There’s debate over how much RAM is actually wiped vs rendered unreadable via regenerated RAM-encryption keys.
Impact on law enforcement and attackers
- Law enforcement commonly keeps seized phones powered on and isolated (Faraday cages) to exploit AFU state; emails reportedly show AFU vs BFU makes a huge difference.
- The 3‑day limit greatly shrinks the window to deploy kernel exploits in bulk, potentially preventing “unlocking sprees” using older, post‑patch exploits.
- Some argue cops will adapt by rushing AFU extraction; others say local agencies often lack zero‑days and rely on later-disclosed tools, so this still helps.
Usability, configurability, and edge cases
- Concern about non‑configurable 3‑day timeout impacting kiosk-style or always‑on uses (wall‑mounted iPads, webcams, CarPlay, DIY home panels, “phone as server”).
- Mitigations mentioned: kiosk/single‑app/Guided Access modes, keeping device unlocked, or disabling passcode (which likely disables the feature, though not clearly confirmed).
- Several want user control over the timeout; others argue configurability would enlarge the attack surface if AFU exploits could extend or disable the timer.
- Debate over whether 72 hours is a compromise between security and user experience, and if Apple might shorten it over time.