Apple Inactivity Reboot, New Security Feature Shuts Down iPhones After 72 Hours of Inactivity

Apple Inactivity Reboot, New Security Feature Shuts Down iPhones After 72 Hours of Inactivity

LAZYTECHNEST.COMApple’s latest iOS update introduces an innovative security feature, the New Apple security feature known as Inactivity Reboot.

This mechanism automatically reboots the Apple iPhones if they remain unlocked for 72 hours, adding a new security safeguard feature against unauthorized access.

Security experts have been keenly analyzing its implications, which are already stirring significant debate among law enforcement agencies and digital forensic analysts.

Last week, 404 Media highlighted concerns from forensic experts who found iPhones rebooting unexpectedly, making it harder to retrieve data.

Further analysis by 404 Media revealed that the iOS 18 update introduces this inactivity reboot feature specifically to prevent prolonged access without user authorization.

Jiska Classen, a security researcher at the Hasso Plattner Institute, was one of the first to identify this function.

READ MORE:Should Phones Be Allowed in School? Uncovering 10 Powerful Benefits for Modern Learning

On Wednesday, Classen shared a video demonstrating that iPhones left untouched for 72 hours automatically reboot, re-securing the device’s encryption.

This feature triggers only when the device remains idle, rendering even the most advanced forensic tools less effective.

Magnet Forensics, a company specializing in digital forensic tools, also confirmed this 72-hour timer for inactivity reboot.

By rebooting the phone, iOS locks encryption keys back within the device’s secure enclave chip, a vital defense against unauthorized access.

As Classen noted on X, “Even if thieves keep the device powered on, they can’t bypass it with outdated forensic tools.”

However, this feature presents challenges for investigators.

READ MORE:NatWest Cracks Down on Messenger Usage, Banning Popular Apps on Work Devices in New UK-Wide Policy

While it makes data extraction harder, analysts can still work within the 72-hour window.

Once that time elapses, the iPhone’s security heightens, frustrating efforts to bypass it.

Forensic researchers have long classified iPhones in two states: Before First Unlock (BFU), where data is fully encrypted, and After First Unlock (AFU), where some data is more accessible.

In BFU, access is nearly impossible without the passcode, whereas in AFU, some data can be extracted even if the device is locked.

This new security protocol leans into BFU protections, creating more “cold” devices—rebooted and difficult to penetrate.

Tihmstar, a well-known iPhone security researcher, elaborated on this impact, stating that most forensic operations prefer devices in AFU, or “hot” state, where the correct passcode has been entered at least once.

READ MORE:Bluesky Down Amid User Surge, Can It Compete With X’s Massive Follower Exodus?

However, once an iPhone reboots due to inactivity, it returns to a “cold” BFU state, significantly raising the security barrier.

This update underscores Apple’s commitment to user security, even as it complicates forensic investigations.

Share this:

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top