Posts Tagged #iOS

iOS is Apple’s mobile operating system that powers iPhones, iPads, and iPods.

Updated Posted by Arnon Erba in News on .

The proximity sensor on several iPhone models appears to have been temporarily affected by the iOS 11.3 update released in March this year. The proximity sensor, which is located near the earpiece and the front-facing camera, is supposed to detect when the phone has been placed near a user’s ear so that the screen can be blanked to prevent unwanted touch input. However, after the iOS 11.3 update, some proximity sensors appear to be constantly stuck on, causing the screen to go black even when the phone is not engaged in a call.

I confirmed the issue on my iPhone 7 after trying to figure out why the screen was randomly turning black. You guessed it: I was placing my finger over the proximity sensor by mistake. Upon further investigation, it turned out that I could replicate the strange behavior in any app and even on the home screen.

The Fix: Force Restart

Fortunately, a force restart fixed the proximity sensor issues, even though a regular shutdown/restart did not. To force restart your iPhone, refer to Apple’s help page on the subject:

iPhone X or iPhone 8

Press and quickly release the Volume Up button. Press and quickly release the Volume Down button. Then, press and hold the Side button until you see the Apple logo.

iPhone 7

Press and hold both the Side and Volume Down buttons for at least 10 seconds, until you see the Apple logo.

iPhone 6s and older

Press and hold both the Home and the Top (or Side) buttons for at least 10 seconds, until you see the Apple logo.

The Forums Agree

It appears the proximity sensor issue has already made an appearance on the Apple forums:

Updated Posted by Arnon Erba in Op-Ed on .

(Editor’s note: This is not my favorite take on the Apple-FBI case. There are still several reasons why the existence of an iPhone backdoor, no matter how complex, would be a threat to the security of all iPhone users. This article was meant to emphasize the fact that the FBI’s desired solution in the 2016 case was not a remote backdoor but instead a tool that could unlock iPhones only if they were possessed in person. However, this article glosses over several facts, like the potential for phones to be stolen or removed during customs checks or the potential for abuse by less scrupulous foreign governments if the proposed tool was ever leaked. There are certainly situations in which the possibility of a government seizing a cell phone without proper legal precedent is a reality.)

If you’ve been on the Internet in the past couple months, you’ve most likely read about the Apple-FBI debate surrounding the San Bernadino iPhone. This post isn’t intended to be a full breakdown of the case, so if you’d like to catch up on what’s happened so far, I would recommend reading articles from Wired, The Verge, Macworld, and any other sites, including Apple’s Customer Letter. Sometime in the future, I hope to write a more in-depth breakdown covering what’s going on, so keep an eye out for future posts. With that aside, I wanted to bring up something that might make the case seem a little less dramatic for all of us security-conscious iPhone users out there, and will make sense to anyone who’s read up on the FBI’s request of Apple.

There are two important notes about the FBI’s request that make the idea of a custom built iPhone passcode-breaker seem a little less scary. One, to actually use the passcode-guessing software that the FBI wants Apple to build, the FBI (or any law enforcement agency, for that matter) would need full, unfettered, and long-term physical access to the phone. This is not a software backdoor that would allow remote access to the iPhone; rather, it’s a tool that would require extensive time and physical access to use. To use the tool, law enforcement would have to physically confiscate your phone, and at that point we can assume that you’ve done something to generate probable cause.

The second point to consider is that the FBI is banking on the possibility that the passcode on the San Bernadino iPhone is short enough that it can be brute-forced. Logistically, the passcode needs to be four digits to be easily cracked. If you use an iPhone with a six-digit passcode – or better yet, a custom alphanumeric code – the passcode-breaking software will still work, but the time required to successfully brute-force the passcode would generally make the attack infeasible.

Bottom line: if you have a four-digit passcode, and you feel that you’re in imminent danger of having your iPhone confiscated by the police, you might need to worry about your security. Or, you could stop doing whatever it is that would make you a police suspect in the first place. Ed: this is an over-generalization regarding the circumstances in which a cell phone could be confiscated by a government. The rest of us can just set up six-digit passcodes and continue on with our lives.