Connect with us

Hi, what are you looking for?

Tech & Science

Unpatchable bootroom exploit could affect millions of iOS devices (Includes interview)

According to the website iPhone Hacks, an unpatchable bootrom exploit has been discovered that affects a range of iOS devices out there starting from the iPhone 4s to the iPhone X. The bootrom is called ‘Checkm8’. According to The Verge, though, Checkm8 is one of the biggest jailbreaking developments in years due to the sheer scope of what it covers.

The bootrom exploit works on iOS devices with Apple A-series processors starting with Apple A5 from 2011 to the Apple A11 from 2017. A bootrom (or ‘Boot ROM’) is a small piece of mask ROM or write-protected flash embedded inside the processor chip. It is a form of ‘jailbreaking’ (in Apple-speak); jailbreaking permits root access in Apple’s mobile operating system.

The main limitations with this cyber-threat is that an iOS device needs to be physically connected via USB for the initial jailbreak, and the exploit doesn’t work remotely. However, in such circumstances, the boorom can enable some third-party keyboards to access iPhone and iPad data without the user’s permission.

Speaking with Digital Journal, Sam Bakken, Senior Product Marketing Manager, Mobile App Security at OneSpan says this is just the latest in cyber-issue affecting both Apple and Google – and despite some ‘myths’ Apple devices are not more secure than Andropid devices: “We’ve seen a rash of vulnerabilities discovered in Apple’s iOS this month, which I hope starts putting to rest discussions of which operating system is more secure. The answer is neither one!”

He adds that: “Checkm8 serves as the latest reminder that neither Android nor iOS will ever be 100% secure. Neither Apple nor Google can or will immediately fix each and every security issue brought to their attention, leaving users and the apps they install exposed.”

Bakken adds that security needs to be something put in place at the outset, a fundamental feature of ‘quality by design’: “Mobile app developers cannot depend solely on the security of the operating systems or manufacturers’ devices to secure their apps. Security features must be baked into the app development process from the start and developers must operate under the assumption that their apps will be installed on and launched on some number of insecure devices. ”

He goes on to explain the types of security protocols required: “Securing apps through technology such as device binding and secure communication channels and then also gaining visibility into jailbreak and root status and the app’s runtime environment can fortify a mobile app even in risky environments such as jailbroken phones so that the app can be intelligent about what it will and will not do in those situations.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

The groundbreaking initiative aims to provide job training and confidence to people with autism.

Entertainment

Steve Carell stars in the title role of "Uncle Vanya" in a new Broadway play ay Lincoln Center.

Entertainment

Actors Jeremy Jordan and Eva Noblezada star in the new musical "The Great Gatsby" on Broadway.

World

US Secretary of State Antony Blinken (L) is paying his second visit to China in less than a year - Copyright POOL/AFP Mark SchiefelbeinShaun...