• henfredemars@infosec.pub
    link
    fedilink
    English
    arrow-up
    260
    ·
    edit-2
    5 months ago

    You do it because it makes an attacker’s life harder because now I have to find two bugs instead of one.

    The entire boot chain of the phone up to the apps you run are verified successively by the component that loads it. A digital signature helps ensure that only trustworthy code ever runs. A bug must be found to bypass these checks to load malware code. For example, a bug in the image code in a web browser might cause loading of code that isn’t checked. This way the malware gets smuggled onto the phone.

    This means that if you get hacked via one bug and malware is loaded, the attacker has to work harder to solve the problem of how do I convince the phone to load it again at boot because the code it’s made of isn’t going to be approved code. When you reboot, you are effectively forcing a validation that all the code you have running is authentic, which would exclude the malware. Trick me once sure, can you survive a full pat down? Probably not. It’ll get caught.

    Unless I have a second bug to fool the normal code loading systems too, the malware can’t run. You have to go back and trigger the first bug again somehow, which places more strain on the attacker.

        • Chozo@fedia.io
          link
          fedilink
          arrow-up
          22
          ·
          5 months ago

          I hope you get more chances to do so; you explained the situation in a much better way than the article and convinced me to reboot my phone.

          • SeekPie@lemm.ee
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            5 months ago

            You restart your phone because of security.

            I ‘restart’ my phone, because it’s overheated and lost its battery % to 0.

            We’re not the same.

        • DjMeas@lemm.ee
          link
          fedilink
          English
          arrow-up
          4
          ·
          5 months ago

          Thank you, friend. You’ve convinced me to restart my phone.

          • henfredemars@infosec.pub
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            5 months ago

            Personally, I restart mine maybe once a week. No need to go crazy with it, but it helps make life harder for bad actors and might make your phone run better.

        • Iapar@feddit.de
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          If you have a blog where you talk about that, I would like to read it.

    • username@lemm.ee
      link
      fedilink
      English
      arrow-up
      32
      ·
      5 months ago

      Exactly, as you already explained in detail this is primarily for security.

      GrapheneOS has a feature to set a time after which the phone reboots in case there was no unlock. So in case a bad actor gets your phone they only have that time with a running system after the first unlock. However, if you use it normally, and unlock it in regular intervals it does not auto-reboot. This is especially neat if your threat level is not “investigative journalist” or “political activist on the run”, because then you can set the time to a longer interval and the phone does not reboot every night when you are asleep which also leads to the SIM card being locked and nobody being able to call you…

    • TAG@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      5 months ago

      But that only works for untrusted code escaping a sandbox, right? It does not help with malicious code embedded into legitimate seeming apps. The later vector seems easier, especially on Android, no?

      • henfredemars@infosec.pub
        link
        fedilink
        English
        arrow-up
        13
        ·
        edit-2
        5 months ago

        I don’t really consider a malicious app to be an exploit. In this case, the software is doing exactly what it was designed to do – malicious activity. It’s not being manipulated to perform unintended operations through the exploitation of a software bug. Code signing and secure boot are not effective in the face of intentionally shipping malicious code to end users. It’s designed to frustrate actual hackers.

        For malicious-by-design apps, we rely on a central app store that hopefully reduces the number of bad apps in circulation. If you publish malware, eventually you get caught and we know who you are. Sandboxing with a permissions system helps prevent apps from performing actions contrary to the user’s interests. E.g. why is my flashlight app asking for my contacts when I pressed ‘change color?’

        If you directly exploit your way in, it’s harder to know who did this and why because you didn’t go through any central vetting or accountability system, and you’re not so easily bound by the permissions system. It depends on what your bad guy’s goals are, what they want, whom they’re targeting. Force your way in the back entrance, crawl through an open window (like a weak security setting), or lie your way in the front door (trojan)? It depends.

        None of it is perfect, but I’m sure OS design experts would love to hear about better solutions if any exist.

        • skye@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          wouldn’t a malicious app still be an exploit though? I’d say that if I download an app for playing a game, but instead it was designed to also upload my private photos to the attacker’s server, i’d say that’s still exploiting. It’s just exploiting my expectations of what the app should do, rather than leveraging a system weakness (which it probably does, anyway)

      • iturnedintoanewt@lemm.ee
        link
        fedilink
        English
        arrow-up
        9
        ·
        5 months ago

        Pixels with grapheneos can reboot automatically after a number of hours with the screen off (unattended because you are sleeping). But this would also interfere with Whatsapp backup, which happens overnight.

    • ElderWendigo@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      8
      ·
      5 months ago

      This is gonna sound odd, but have you cleaned out the USB port lately? Weird stuff happens when pocket lint collects in there. I thought mine had a dead port until I picked out (with a non-conductive toothpick) the lint I didn’t realize had accumulated.

    • jbk@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 months ago

      Don’t e.g. alarm apps not work after that until you unlock your phone since the device data decryption keys weren’t kept in RAM after rebooting? I have that feature off since I don’t want that to happen. Afaik AOSP has added that to make installing updates more seamless, but it’d be useful for this too. (And since Samsung usually sucks at improving their already self-made stuff to align with AOSP, like Virtual A/B updates, I’m just assuming this)

    • kromem@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      8
      ·
      edit-2
      5 months ago

      Replace your battery.

      Your phone is 2 years old.

      Phone batteries are typically designed to last around 2 years before they really degrade because a lot of people buy new ones around every 2-3 years.

      When the battery can’t sustain the same throughput, the phone can handle this in one of two ways.

      1. Slow the phone down. This is what Apple does and why people with iPhones 2 years old complain the new update slowed their phone down.

      2. Don’t slow it down but if the throughput drops below what’s needed, die and reboot. This is what your phone is doing.

      Getting a new battery will probably stop this behavior (and for iPhone users reading this, getting a new battery for a 2 year old phone will make your phone faster).

      • qprimed@lemmy.ml
        link
        fedilink
        English
        arrow-up
        18
        ·
        5 months ago

        well, I mean… anything can leak memory. but yeah, enterprise/carrier grade devices are designed to be in continuous use for years and they generally do that pretty well.

        • sugar_in_your_tea@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          9
          ·
          5 months ago

          Even then, some places will reboot on a schedule when nobody should be using it.

          I have some entry level “enterprise” hardware (Mikrotik router and Ubiquiti access point) and I auto-reboot mine weekly. In addition to maintaining performance and minor security wins, it also helps ensure everything csn survive a reboot (e.g. all configurations have persisted to disk).

          It’s good practice. Some people brag about continuous uptime, I see it as a liability.

          • yeehaw@lemmy.ca
            link
            fedilink
            English
            arrow-up
            5
            ·
            5 months ago

            It’s good practice for patching purposes. You should always be maintaining stable OS versions and a memory leak or the like is fairly uncommon. I think I’ve seen it once in my career on a particular check point OS version.

            • sugar_in_your_tea@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              2
              ·
              5 months ago

              Yeah, I’m more worried about keeping up on patches and ensuring things will start back up properly than memory leaks. But minor security and performance wins are nice too.

          • locuester@lemmy.zip
            link
            fedilink
            English
            arrow-up
            4
            ·
            5 months ago

            Absolutely. Nothing scarier than rebooting the computer or router that’s been running for 10 years.

            I also enjoy exercising software blue/green rotation weekly. Even if no code changes, have it roll to the alternate infra on an automated schedule. Is a great habit to get into and helps any engineer sleep better. It also results in providing very accurate downtime recovery numbers - not estimates.

          • dustyData@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            5 months ago

            That’s why all master systems have a backup At least on datacenters 10 years ago is how we did it. We could run a patch, system update, data backup, system restart or whatever it was required to almost any piece of kit on the racks without losing continuity of service. Just do the backup first, then the same operation on the master, if any of them fails the whole architecture is designed to pick up the tasks and continue as if nothing wrong is going on. It was expensive, but they were mission critical banking infrastructure. The thing only went out for account balancing, but it was at 3am when it was likely that no one would need it, and even then for the user there was no loss of service. Transactions still went through, just with a couple of hours of delay for the whole ordeal to sync up.

      • tal@lemmy.today
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        2
        ·
        5 months ago

        If my router rebooted once a week, it would be in the trash can.

    • Tag365@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      5 months ago

      Feels like I need to reboot my iPhone daily in order to keep applications and tabs from being terminated from out of memory issues as quickly.

      • Rai@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        5 months ago

        I have an old-ass iPhone XS and don’t run into this issue. But mine has a LOT of storage so maybe that helps?

      • viking@infosec.pub
        link
        fedilink
        English
        arrow-up
        8
        ·
        5 months ago

        Yes, a reboot is a reboot. As long as the boot sequence cycles through where the code is validated, you’re good.

        • Chozo@fedia.io
          link
          fedilink
          arrow-up
          2
          ·
          5 months ago

          a reboot is a reboot

          Not always. Some phones will do a sort of “soft” reboot, which doesn’t actually go through the entire boot process, but is more like logging out of the active OS user and back in, reloading some of the OS but not all.

          Pretty sure a system update would trigger a full reboot, though, but I’ve seen the option for this sort of partial reboot in the power menu on some devices in the past.

  • variants@possumpat.io
    link
    fedilink
    English
    arrow-up
    16
    ·
    5 months ago

    I remember my old phone had the option to auto reboot and I had it set to like 3am but now I don’t see that option on newer phones. My previous phone didn’t even have a reboot option I had to shut it down and power it back up

    • CaptKoala@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 months ago

      TIL, I use GOS and never thought to look, I just see a banner saying there’s been updates and I’ve got “update and restart now”, “schedule restart” and “I’ll restart myself when ready” (or some such).

      • impure9435@kbin.run
        link
        fedilink
        arrow-up
        4
        ·
        5 months ago

        The main purpose of this is actually security. Because when the device is in BFU (before first unlock) state, it’s much harder to gain access to the data (without the correct unlock credentials). During the reboot, the encryption keys are wiped from RAM, making it essentially impossible to access the device, since brute-force unlock attempts are prohibited by Weaver API, which is enforced by the Titan M2 hardware security module. You can read more about this at https://grapheneos.org/faq#encryption

        • CaptKoala@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 months ago

          I will give that a read. I have been unintentionally using this feature, anytime I expect I won’t use the GOS pixel for a bit I restart it, I’ve also found it disables biometrics as a security measure. Cool stuff.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    2
    ·
    5 months ago

    This is the best summary I could come up with:


    Forbes uncovered a seriously dated NSA document outlining the best practices for keeping your phone safe from bad actors in the digital space.

    The phones depicted are a 2010s-era iPhone with the original push-button Home button and a Samsung Galaxy smartphone.

    Over a dozen tips are included, ranging from “considering using Biometrics” to “only use original charging cords.” It’s all fundamental stuff you’ve seen before, but the advice that’s got everyone’s ears perked up is the NSA’s suggestion to power your device off and back on weekly.

    It’s a simple way to either force a waning software update or clear any background apps and memory leaks that might contribute to a too-hot-too-handle metal phone.

    I’m a frequent restarter because I have cell signal issues in my area—a quick reboot usually does the trick, though not without my heart beating rapidly as I wait to see those mobile service bars return.

    The Google Pixel doesn’t have a scheduled offering, but there is an option you can toggle on to have the device automatically restart once it receives an over-the-air (OTA) software update.


    The original article contains 314 words, the summary contains 181 words. Saved 42%. I’m a bot and I’m open source!