Questions tagged [ios]

iOS is Apple's operating system for the iPhone, iPad and iPod Touch.

iOS is Apple's operating system for the iPhone, iPad and iPod Touch. Questions in this tag should be about:

  • risks in deploying iOS devices and potential countermeasures
  • security features available for iOS app developers
  • secure development of iOS apps

Not to be confused with IOS, the operating system found in Cisco's network hardware.

493 questions
8
votes
0 answers

Why is iOS sending HTTPS requests even with background refresh disabled?

I've installed NextDNS on my iPhone and started noticing random connection requests to *.aliexpress.com, live.musical.ly, amazon.sa, and others. What made me wonder is that I don't have "background app refresh" enabled, No app from TikTok,…
6
votes
2 answers

Accessing iPhone data without passcode - how difficult?

I use iOS7 with a 4-digit passcode that isn't on any top 10 lists. I have "Erase all data after 10 failed passcode attempts" turned on. How hard would it be for someone who stole my phone to get access to my email?
John Shedletsky
  • 161
  • 1
  • 3
5
votes
3 answers

Detection of function hooking in iOS

So far as I know, in iOS there are three techniques of function hooking: preload library using DYLD_INSERT_LIBRARIES imported symbol table redirection using fishhook patch the functions when they are already loaded - i.e. already in memory using…
Krypton
  • 228
  • 2
  • 6
4
votes
2 answers

iOS data protection: Who decrypts files transferred over USB?

I'm trying to understand an implementation detail of Apple's data protection in iOS: I know about the per-file encryption and the various key encryption classes and keybags; however, I don't understand how that works for file transfer over USB (e.g.…
lxgr
  • 4,243
  • 3
  • 30
  • 37
2
votes
1 answer

iOS: intercepting passcode before it reaches secure enclave

From what little I read about Apple's "Secure enclave", I understand that it's a coprocessor which encrypts/decrypts data based on the user's passcode. So here's the scenario: I somehow get root access to the main OS. When the user is prompted for…
scribu
  • 123
  • 4
1
vote
0 answers

Does any MDM provide privacy assurances to the end user?

I'm a former network admin who deployed and configured MDM solutions. I recall being able to do things like List all the applications on a device (including 3rd party apps) Get device IP information, which could be used in geo tracking Get the…
Ran Dom
  • 131
  • 4
1
vote
1 answer

Where are the apple-app-site-association files cached/stored on iOS when Universal Links are used?

The official documentations states that when users install your app, iOS checks a file that you’ve uploaded to your web server to make sure that your website allows your app to open URLs on its behalf. Only you can create and upload this file, so…
westbeam87
  • 439
  • 4
  • 12
0
votes
1 answer

iPad accessible when I connect to internet?

At one point today my teacher was saying that we shouldn't have social media etc. They also at one point said that the school could access (and view "everything") on our iPads when we are connected to the internet. They did say that the school…
0
votes
1 answer

Can data be uploaded to iCloud without your consent?

I have been a loyal iPhone user for years. I did have two Apple IDs previously. The other one has already been deleted by Apple formally. The current Apple ID I am using was set up years ago when you had the option of opting out from iCloud…
Extrasecurity
  • 37
  • 1
  • 8
0
votes
1 answer

How Can I Tell With Certainty If My iPad Has Been Hacked?

I suspect the "Phoner" app from the Apple App Store compromised my iPad along with the device's IMEI. After accepting a phone call on the iPad (I later found out to be a Google-generated listing), I noticed that the call record function that usually…
RandallK
  • 1
  • 1
  • 1
-2
votes
2 answers

Is Spyzie a scam that allows people to pull data from iCloud?

Came across an iOS tracking software called “Spyzie” which allows parents to monitor kids’ data usage including call logs, messages, browsing, and many more. One of the key features this software raises the flag for average Apple users is that it…
Extrasecurity
  • 37
  • 1
  • 8