Apple has just discreetly deployed on the iPhone a new security system called USB restricted mode. As the name suggests, this new device was designed to prevent hackers and government agencies from siphoning data from the iPhone or iPad via the Lightning port. Here's how it works..
Block communication with USB accessories
Your smartphone most certainly contains personal information or even confidential information that you would not want to see disclosed. But are you sure about the security of your iPhone? If yes you are wrong.
You probably ignore it, but some hackers use boxes that allow them to bypass the mobile security code. Once connected to the Lightning port of an iPhone, this little accessory will compose all possible combinations in record time by bypassing the attempt restriction system..
At the end of the process (more or less long depending on the security level of the lock code) the iPhone will display the password on its screen. Malicious people will then only have to recover the personal data stored in the memory of the terminal.
Apple was quick to find the parade. The new security measure available in iOs 11.4.1 will prevent USB accessories from connecting to the iPhone. Hackers will no longer be able to use the Lightning port to hack Apple smartphones or tablets..
How to activate restricted mode on an iPhone
The iPhone is more like a safe smartphone. But no computer system can be completely secure. Restricted USB mode improves data protection by making it harder for hackers to access your iPhone.
Here is the procedure to activate and configure it. Important detail, this device is only available on devices running iOS 11.4.1 or higher.
- Click on the Settings icon on your iPhone desktop
- Select the Touch ID and code or Face ID and code option depending on the model of your terminal
- You will be asked to enter the secret code of your device to access this menu
- Scroll down to the USB Accessories section
- Attention, the switch must be in the Off position (gray).
If the button is green, the restricted USB mode is deactivated. USB devices can then connect to your iPhone or iPad even if the latter has been locked for more than an hour.
Restricted USB mode does not provide full protection
Now that Restricted USB mode is enabled, hackers will no longer be able to use USB accessories to unlock your phone. This security device will automatically cut connections via the Lightning port within one hour of being locked.
The iPhone port can only be used to recharge the battery. Take a test and connect an accessory to your iPhone with the USB cable. A message will appear on your iPhone screen asking you to unlock your smartphone to activate the USB accessory.
Unfortunately this new security device suffers from some shortcomings. Firstly, the one hour limit can be very easily circumvented. As soon as a thief seizes your iPhone, nothing prevents him from connecting a USB accessory to block the countdown of the restricted USB mode.
This will give him the time necessary to bring your mobile back to a safe place and then try to recover the data with these hacking tools. Experts have tested the Lightning to USB 3 camera adapter and it works great.
Obviously this only works if the lockout time of one hour has not been exceeded. Otherwise, the USB mode will automatically activate and the thief will be able to do nothing more.