Comments

You must log in or register to comment.

oauth20 t1_iw74ia4 wrote

Possibly this was kept as backdoor for government agencies šŸ‘€

28

twitterfluechtling t1_iw74t7q wrote

What about encrypted devices? I expect Android can't unlock the storage without the security code, so it should be logically impossible to dismiss that dialog and still start the device?

76

Lance-Harper t1_iw75jzo wrote

Thatā€™s conspiracy whilst google patched it last week.

If the gov REALLY wants something from you, there are many many other ways than asking a tech giant to manufacture a front door (because thatā€™s not a back door), and making it look like a bug, only temporary.

39

random125184 t1_iw77gsu wrote

Reported in June. Not fixed until November. Holy shit. This is huge. Why is no one else talking about this?

154

masterhogbographer t1_iw7df4k wrote

Because it isnā€™t apple.

And I say that with zero intention on trying to start a flame war.

I say that because due to various reasons whenever apple has a flaw like this everyone knows about it very quickly after reported. And by everyone, I mean everyone.

There was a hands on device vulnerability in iOS last year or the year before, that my wife asked me about wondering if she needed to upgrade iOS asap. She is not tech savvy and Iā€™m the only one in her life that is.

The inverse is, when thereā€™s a similar exploit for non-apple devices, even people in the field can miss it. A friend of mine is a decent techie. Works in IT, and one of their specialities at the company he works for is security.

But the last few vulns for android that have popped up, Iā€™ve been the one notifying him ā€” he an android user and apple hater, me somewhat agnostic ā€” of those vulnerabilities. Meanwhile, he texts me the instant thereā€™s public word of an iOS or MacOS exploit lmao (not even joking, his hated is not healthy imo, but I guess tribalism is society these daysā€¦)

The sad part is, if this was apple, after just an hour this post would be front page back in June. And then there would be reposts of the same blog articles across dozens of subs that also would have been top of their sub with hundreds of comments and every month since June thereā€™d have been more articles bubbling to the top with titles like ā€œhow hasnā€™t apple fixed this yet?ā€ Or ā€œTim cook should resign in face of deflategateā€ wait thatā€™s another thing entirely

125

jdeezy t1_iw7h3vm wrote

What bout android 8?

2

RejZoR t1_iw7h9hz wrote

Thing with iPhones is, you know if you're affected or not. I've recently returned to Android and I have no clue if my Poco is affected or not. And knowing Xiaomi, it's either not affected because it's so modified or it is affected and won't be fixed even months after Google fixes it in AOSP repository.

49

Translationerr0r t1_iw7hb3t wrote

I hope you all noticed the "started from an unlocked state"-statement.

149

Translationerr0r t1_iw7hnvf wrote

The article mentions you either run into fingerprint unlock screen (when starting from a locked screen or after restart) OR you start from an unlocked screen (which makes the hack just a waste of time as its already unlocked).

4

No-Mission-962 t1_iw7n1oi wrote

Lol, its not as big people are making it to be. Basically the person needs to know the Sincard unlock code and even after that the device will ask for a fingerprint.

−3

the-samizdat t1_iw7nw28 wrote

What is an ā€œattacker controlled simā€?

4

hildebrot t1_iw7oa9y wrote

Right, so for anyone who didn't read the article:

  1. The only way to get inside the phone was either with a correct fingerprint OR if he started in UNLOCKED STATE. Meaning that this was all useless because why would you do all that if you already have access?

  2. This was only possible on two Pixel phones, not Android as a whole. Kind of stupid to write a title like that.

35

Stingray88 t1_iw7p372 wrote

Thatā€™s not true, thatā€™s not how it works at all.

Apple Watch can only unlock your phone if it is already unlocked. And it only tries to unlock your phone after it fails to unlock via FaceID because youā€™re wearing a mask or something.

13

BasementDweller3000 t1_iw7ph2w wrote

I know thatā€™s how itā€™s supposed to work, but I saw it unlock my iPhone without the Watch not even being on my wrist yet.

Edit: Never mind. I was mistaken. After trying to replicate it a few times, it seems that what actually happened is I had my iPhone in front of me, my face unlocked the iPhone and then my iPhone unlocked my Watch the moment I got it in my wrist. I misread the notification telling me that my iPhone unlocked my Watch as if it were saying my Watch unlocked my iPhone.

5

synackk t1_iw7przs wrote

  1. Unlocked state here means at some point the phone has been unlocked at least once for the encryption. If someone stole your phone after youā€™ve used it one, theyā€™d be able to bypass the unlock screen.

  2. Thatā€™s just what the discoverer of the exploit was able to test it on. There have been other reports itā€™s worked on non-pixel phones or custom android distributions.

63

tlsr t1_iw7rq7g wrote

>accidentally finds a way

Whips out "attacker controlled sim"

18

Informal-Lead-4324 t1_iw7tfv8 wrote

What software is better on it?

And wym implementation

The only time I've delat with Apple support, it's been the phone(battery )breaking and them telling me to buy a new device lol. Fortunately they got sued for It I think

19

MC68328 t1_iw7yzmx wrote

And every Pixel phone from the Pixel 4 and earlier will have this fatal flaw, since Google refuses to continue security updates.

5

tsfbdl t1_iw82y8q wrote

Ehhh I don't even put a lock on my phone I'm mentally disabled and can't remember passwords easily everything I have is written on the phone and if I get locked out I'm screwed

−4

Complainer_Official t1_iw84x81 wrote

the new software is too demanding for old hardware.

although, it seems like it would add a few jobs for the economy if google had a division for keeping their old code up to snuff.

or even allow opensource devs to do it. that would be cool too.

−3

Hilppari t1_iw85j6h wrote

its alot more than two pixel models. other brands are affected. i've tested on zenphone 9 and even lineage OS. with latest updates. older phones that dont have any more updates are also affected.

10

Eskimoobob t1_iw87num wrote

Uh not to deflate you, but my work is predominantly apple and what I monitor for security flaws, but I utilize Android devices personally.

I naturally come across research for apple devices but we have no Android for our MDM so it isn't pertinent to our mission.

−5

synackk t1_iw88blr wrote

That came from the original source: https://bugs.xdavidhu.me/google/2022/11/10/accidental-70k-google-pixel-lock-screen-bypass/

>>> As I did before, I entered the PUK code and choose a new PIN. This time the phone glitched, and I was on my personal home screen. What? It was locked before, right? This was disturbingly weird. I did it again. Lock the phone, re-insert the SIM tray, reset the PINā€¦ And again I am on the home screen. WHAT? My hands started to shake at this point. WHAT THE F**K? IT UNLOCKED ITSELF?

Article could be wrong or wording it poorly

15

KiraUsagi t1_iw8e27q wrote

The attacker controlled Sim is just there to show how an attacker would get in. You could do it with the Sim that was already in there but you need to know what the pku code is. This is how the researcher originally discovered the flaw.

11

JazzioDadio t1_iw8gadf wrote

It's nitpicky but for the sake of accuracy it should be said that Google's Pixel phones have held the crown of best camera processing software for some time now.

With Apple's new(ish) custom silicon I'd agree that their implementation of certain features is still top notch, but they'll have to work to keep that lead.

7

RejZoR t1_iw8gm8y wrote

Just out of curiosity if anything has improved. It mostly hasn't. Have plans to buy Galaxy S23 if it'll be any good, but couldn't wait for that long.

5

JazzioDadio t1_iw8gvs3 wrote

That's an awfully convenient excuse. I'm sure if they wanted to they'd find a way to get new security updates on much older hardware, but they won't do that because then no one would abandon their otherwise perfectly functioning phones. And I say this as a lifelong pixel user.

3

terraherts t1_iw8m8dn wrote

Completely disagree on software.

Speaking as someone who owns an Android phone (Pixel), an iPad, a Windows PC, a macbook pro, and uses Linux for work, so I use a bit of everything.

They get a lot of low-level software stuff right, certainly, especially for a company that's making a lot of bespoke proprietary hardware. But their frontend and first party stuff is... not great.

iOS's notification system is still leagues behind Android, and I find the less I use Apple's first party software on macOS the better. "Ecosystem integrations" like sidecar are so unreliable that I've given up trying to use them, Stage Manager are really half-baked (iOS) or seem to duplicate existing features (macOS), etc. Settings and breadcrumbs on iOS are still a headache. iTunes is somehow still one of the worst interfaces I've ever used, people just don't notice as much because it's rarely needed anymore. Finder is still my least favorite default file manager across any desktop OS. Files on iOS only recently became what I'd consider non-alpha quality.

Main reason I have the macbook pro (M1) and iPad is the hardware. Apple's made some flubs on hardware too of course (most of the MBPs from 2016 up until the new M1's for example), but a lot of their more recent stuff is very solid on that front.

8

TheElusiveFox t1_iw8nz2s wrote

By Android phone owner, they mean Security researcher, and by accidentally, they mean this convoluted 5 step process...

I'm not saying it isn't terrible that you could bypass the lock screen, but lets not pretend that some one just accidentally swiped diagonally or something and the phone opened.

−2

RipThrotes t1_iw8rit5 wrote

There is a way to bypass the lock screen while starting my Samsung Galaxy s10e.

When you boot up, it has to load all settings or something like that, and at the right point in boot up it will allow you to navigate the phone before everything has loaded.

It may push you to the lock screen once that has configured, I don't do it often, but it may be a legitimate variation of this "news" story.

1

killerjerick t1_iw8s6ln wrote

Classic that the top level comment and itā€™s most upvoted reply are completely false if you bother to read the article in its entirety, or you know, watch the video includedā€¦

4

SMHeenan t1_iw9176l wrote

For what it's worth, my Pixel did not notify me of this security update. I had to manually update my phone to get this patch.

1

Macluawn t1_iw9p8dy wrote

When a phone is rebooted, a password must be entered before touch id or face id will work.

In this context, "unlocked" doesnt mean you start from the home screen - it means the password was entered at some point since the phone was last booted up and is now in an unlocked state where touch/face id can be used.

7

Starr-Duke t1_iw9qr2k wrote

Can bypass my fingerprint scanner on my note 10 by turning on the screen and tapping the fingerprint sensor with anything while shutting the screen off at the same time. Works 1/10 or so times

1

Myte342 t1_iw9w066 wrote

Hurray the English language! In this instance 'by accident' would mean the person was not actively TRYING to find a way to bypass the lock screen, rather that he happened across it while doing something else. They did not use the term 'accident' to imply the guy dropped his phone and it unlocked. That the entire process involves a few steps does not invalidate that it was discovered 'by accident'.

Example: Post-It Note glue and WD-40 were so totally the intended results and not 'discovered by accident' while trying to create a completely different chemical than what resulted in their experiments so we should just ignore those inventions entirely and downplay their significance cause the inventor didn't just combine two chemicals together and snap his fingers to make something appear but because they both involve a complicated process of multiple steps they couldn't possibly have been discovered by accident.

1

joeg26reddit t1_iwa9so6 wrote

"when he tried reproducing the flaw without rebooting the device and starting from an unlocked state"

​

I found a way to by pass the lock screen

Step 1 ) Start from an unlocked state...

0

aredna t1_iwb86ee wrote

According to his blog it also works after a reboot and that's how he found it. He later found the reboot wasn't necessary. This made it more dangerous because you need less time to get in.

3

ll-0000-ll t1_iwbcnat wrote

The software is better because its much more optimized. Iphones have longer battery life than androids while having a smaller batter. How? Software. This is just an example.

1

ZZ3xhZz t1_iwbkkpx wrote

"Android phone owner accidentally" Vs. "Cybersecurity researcher"

Thats a very deceptive headline - the first one implies an everyday joe, and the second one implies a highly specialized expert in the field.

You also need access to the PUK, not something you'd have easy access to unless you already have nefarious ways to access that from the service provider.

This only applies to 2 specific models of phones - the 1000s of other android devices not affected.

0

ListRepresentative32 t1_iwbw4cy wrote

Depends on what exactly works. The lock screen dismiss works everytime, that's true. But its of any use only if the device was previously unlocked with PIN/password after boot. Otherwise the phone is still encrypted and bypassing the screen is useless(you can't access any user data)

1