i30 Owners Club

IPhones 'disabled' if Apple detects third-party repairs

eye30 · 11 · 1667

0 Members and 1 Guest are viewing this topic.

Offline eye30

  • Global Moderator
  • *
  • HOS BOSS
    • Posts: 27,357

    • england England
      Wirral

  • Wirral, UK. - 1.4 Petrol Active - Aqua Blue
The latest software update for iPhone 6 handsets is allegedly rendering the devices useless if it detects repairs not carried out by Apple.

The problem is known as "error 53" and has appeared in Apple products before.

The Guardian reports that users' phones were disabled after the Touch ID home button was repaired by a non-Apple engineer.

The issue appears to arise once devices have been updated to the latest operating system, iOS 9.

http://www.bbc.co.uk/news/technology-35502030
  • 1.4 Petrol Active I'm no expert, so please correct me if


Offline Phil №❶

  • Top Gear
  • *
  • Loco, most of the time!
    • Posts: 21,976

    • au Australia
      Mos Eisley, South Australia
Typical Apple.

Sad for those who own one  :disapp:
  • 2008 SX CRDi Auto White (Lila)[hr]2010 SLX CRDi Auto Red (Ruby)


Offline ibrokeit

  • V.I.P
  • *
  • Author of War & Peace
    • Posts: 1,574

    • au Australia
      Brisbane
Quote
Apple told the paper that iPhone software checks whether any repairs were authorised by Apple.

A spokeswoman said: "When an iPhone is serviced by an unauthorised repair provider, faulty screens or other invalid components that affect the touch ID sensor could cause the check to fail if the pairing cannot be validated.

Not sure if the first sentence is what was communicated - or the writers understanding/interpretation of the second sentence (and/or others) - which alludes to what is actually being done/checked will couching it in terms to make it seem wider than it is.  In other words I think they made a generalising statement on something that was already a generalising/mis-direction statement, but one that still contains the truth.

At least to my understanding of what actually triggers the 'Error 53' on update... the pertinent words I think are actually "the touch ID sensor could cause the check to fail if the pairing cannot be validated."
Basically it is fairly common practice for biometric ID 'smart' sensors (that actually store the ID info encrypted and internally) to be ignored by what they are connected to - if the UID or key they give to uniquely ID itself doesn't match what is stored in the device (i.e. the sensor and device get paired using unique data at manufacture).  In this way the device knows the sensor wasn't swapped (potentially for one with the attacker's ID info already in it) and can be trusted.   Some devices go further locking-down other access until the correct release procedure is used and/or the new sensor is paired to the device (usually to do so requires user having authenticated to it first).

In some setups the ID module also passes an encrypted key to the device when the sensor actually authenticates an ID; in others it passes unencrypted data in a few bytes; or simply sets an output line high/low.

So what the spokeswoman said was true, but in some places more than others.   If it isn't the sensor that is paired to the device then it won't be verified.   And faulty screens and other invalid components could affect that - mainly by the ID sensor being replaced (e.g. as part of the screen) with one not paired to the device.   Usually the device manufacturer will have a procedure/tool/device to change that pairing for the purpose of repairs (though sometimes that means factory reset is needed).   I am not sure that they are checking screen and/or digitizer for uniqueness yet.

In other words - as long as the ID smart sensor doesn't get replaced (i.e. remains paired with it's device) the Error 53 will probably not be triggered.



However it does bring up some questions about what Apple claim about why Error 53 does what it does and why they do it, and why it wasn't before...

A) Last first - why does the check that triggers Error 53 only appear, in reportedly, the latest versions of iOS (presumably iOS 9.x). Has the ID sensor previously not been being checked/validated as being the legitimate sensor for that device (i.e. no pairing check)?  Does that mean previously an ID sensor with someone elses ID data in it could have been installed (and potentially unlock the device for them - that may not have been possible if a further device specific encrypted key was used to inform the device of a match).
B) On reboot/restart/turning-on - you must enter your PIN, even if your using the ID sensor for security (in preference to a PIN).  Doing so reduces security as the attacker MUST use the PIN to unlock, at least, the first time after a power on - i.e. the attacker HAS to KNOW the PIN to do anything.   The same PIN is used to authenticate PIN changes and also to change/delete/add ID data.  An attacker isn't going to change a sensor to circumvent security when they can alter the data in the legitimate sensor for that device using some information they MUST have to get into the device anyway.
C) So Error 53 is simply preventing the use of devices (apparently forever) where the ID sensor has been changed - doing this is in line with common security practice for biometrics sensors, etc. except not being able to recover.   But that isn't really enhancing security at all per sae in this case due to mandatory PIN entry - so most attackers know they will need the PIN in any case and can change/delete/add new ID data using it... therefore they wouldn't change sensor to 'get in' before the change, and definitely won't now being it will result in, apparently permanent, lockout of the device.

That being the case it would seem introducing the Error 53 trigger hasn't really increased the operational security of the device for the owner; and where it may lockout some stolen devices where the sensor was replaced (for whatever reason); it is likely to mostly effect owners who have had ID sensors changed during repairs not done by Apple.

The question is then: Was the last (e.g. stop non-Apple repairs) the intended effect all along? Or just a side-effect?   Numerous people are claiming that was the actual intention - they might be right; or it may just be a misguided security improvement.   If it was the actual intention - then Apple might be heading for a little trouble... basically due to rendering useless a piece of hardware that it does not have ownership of.   As the software/firmware is licensed there isn't too much issue with it being changed/updated inc. disabling due to security reasons.   However it could potentially lead to claims along the lines of 'not being fit for purpose' - i.e. it is no longer usable to do anything it was purchased for.   Rather it would have been better just to cause the update/upgrade to fail and tell the user why.
  • 2019 i30 N-Line Premium (previously 2010 i30cw SLX (Auto) Petrol 2.0L)


Offline AlanHo

  • Global Moderator
  • *
  • Geriatric Teenager
    • Posts: 21,468

    • england England
      Solihull, UK

  • 2021 KIA Niro 3 1.6 Petrol Hybrid
I read chapter one and bookmarked the rest for tomorrow........very interesting :goodjob:........... :rofl: :rofl:
  • 2021 KIA Niro3 1.6 petrol Hybrid


Offline asathorny

  • V.I.P
  • *
  • Wonky Donkey
    • Posts: 6,635

    • england England
      Manchester City centre

  • Curmudgeon
I read chapter one and bookmarked the rest for tomorrow........very interesting :goodjob:........... :rofl: :rofl:

I admire your determination Alan, I gave up after SENTENCE one  :crazy1: :crazy1: :crazy1: :crazy1: :crazy1:


Offline Shambles

  • Admin
  • *
  • Retyred @ Last
    • Posts: 43,337

    • england England
      Manchester, UK
    • i30 Owners Club
It's War & Peace, waddya expect :lol:
  • Ioniq MY2018 SE Premium Hybrid in Polar White with added oomph


Offline asathorny

  • V.I.P
  • *
  • Wonky Donkey
    • Posts: 6,635

    • england England
      Manchester City centre

  • Curmudgeon

Offline AlanHo

  • Global Moderator
  • *
  • Geriatric Teenager
    • Posts: 21,468

    • england England
      Solihull, UK

  • 2021 KIA Niro 3 1.6 Petrol Hybrid
Some people can be so unkind................... :blubber:
  • 2021 KIA Niro3 1.6 petrol Hybrid


Online Surferdude

  • Global Moderator
  • *
  • Tyre Guru
    • Posts: 16,524

    • au Australia
      Caloundra, Queensland.

Offline wbm00

  • 4th Gear
  • *
    • Posts: 362

    • gb United Kingdom
      West Midlands, UK
Not understanding how Apple gets away with this.

Imagine a car manufacturer disabling a customer's vehicle because they had an oil change carried out by a non-franchised dealership using OEM quality (but not manufacturer branded) service parts. It wouldn't be permitted under EU block exemption.
  • 2014 i30 GD 1.4i 98ps 6-speed manual


Offline ibrokeit

  • V.I.P
  • *
  • Author of War & Peace
    • Posts: 1,574

    • au Australia
      Brisbane
So the TL;DR version...

Apple are claiming disabling the touch ID increases security (it seems Error 53 shouldn't be occurring in that instance) if it can't be verified.  But in reality, all up, it isn't actually increasing security much for users by doing so.



As Apple requires you to enter a PIN on restart if touch ID is enabled - the same PIN is used to enter/delete ID data to the smart sensor.  Someone trying to get in will know that they require your PIN in any event - regardless of if they planned to change the sensor or not - as part of accessing your device.  So they will try to get your PIN and not worry about sensor swapping (such as for one with their ID info) - because once in they can make changes to touch ID.

So Apple seems to be using subtle FUD (or one or more spokespeople are misinformed). At one point they are, quoted as, saying something similar to: if the touch ID module doesn't match the module only gets disabled; And if a customer gets Error 53 to contact Apple Support (presumably because that shouldn't have happened).  Then later they are, quoted as, saying similar to: other components (such as invalid or faulty screens) used in repairs could cause the touch ID check to fail.   Well maybe... but most likely it would fail because the original touch ID got replaced as well (less disassembly/fiddling) during an unauthorized repair - rather than they are unique ID checking each component and have someway from that to determine faulty ones.

It is std. security practice, where smart sensors (storing the ID data themselves) are used, to lock-up the system if the sensor can't be verified - until the original is restored or the system is unlocked to use the new one.   However in such cases the unlocking code/procedure is usually NOT the same as the override/bypass code (if there is one), where as with iOS it is, and you don't need to enter the bypass code each time you switch the system on.
  • 2019 i30 N-Line Premium (previously 2010 i30cw SLX (Auto) Petrol 2.0L)


Unread Posts

 


SimplePortal 2.3.5 © 2008-2012, SimplePortal