ο£Ώ Apple designed Lockdown Mode for people facing grave threats, but we're seeing it work in practice against federal forensics. During a recent investigation into a journalist, the FBI reported that it was unable to extract any data from an iPhone because the feature was enabled. It is rare for a software setting to hold its own against professional, state-level tools. πŸ”’ The strength of this mode comes from how it drastically reduces the attack surface of the device. By disabling just-in-time JavaScript and blocking most message attachments, it removes the entry points that forensic tools like GrayKey typically exploit. It also forces the device into a state in which biometrics are disabled, requiring a passcode that often carries stronger legal protections during a search.

🧠 Lockdown Mode specifically blocks wired data connections used by extraction hardware.
⚑ The FBI confirmed in court filings that its Computer Analysis Response Team was blocked.
πŸŽ“ Using this mode requires giving up features like shared photo albums and link previews.
πŸ” Apple offers a $2 million bounty for anyone who can bypass these specific protections.

appleinsider.com/articles/26/0

0

If you have a fediverse account, you can quote this note from your own instance. Search https://infosec.exchange/users/brian_greenberg/statuses/116044194254387144 on your instance and quote it. (Note that quoting is not supported in Mastodon.)