Minggu, 29 September 2019

iPhone 11 review: The most attractive choice in Apple’s best lineup in years - Ars Technica

The iPhone 11
Enlarge / It still has a notch!
Samuel Axon

Like the iPhone XR before it, the iPhone 11 is the default iPhone. It's priced where flagship phones used to be priced, and it offers almost all the same features as the expensive iPhone 11 Pro models that also launched this year.

Apple's iPhone lineup today is stacked with great phones at varying price points, though. So where does the iPhone 11 fit in?

That's what we'll be looking to answer in this review. And we're dubbing this a mini-review because we recently published an in-depth article on the iPhone 11 Pro and 11 Pro Max, and last year we published a full review of the iPhone XR. This year's changes from the iPhone XR to the iPhone 11 are quite modest, so today we'll focus on how this phone is different from this year's flagships and its direct predecessor.

As always, let's start with the specs.

Table of Contents

Specifications

The iPhone 11 measures 5.94 x 2.98 x 0.33 inches (150.9 x 75.7 x 8.4mm), and has a 6.1-inch (154.9mm) LCD display with a resolution of 1,792 x 828, a typical contrast ratio of 1,400:1, and a maximum brightness of 625 nits. The phone comes in 64GB, 128GB, and 256GB storage configurations at $699, $749, and $849, respectively.

Apple has included its A13 system-on-a-chip, which includes numerous components: a central processing unit, a graphics processing unit, an image signal processor, the Neural Engine for machine learning, and a bunch more. Apple claims that almost all aspects of the A13 are 20% faster than what we saw in the A12 that appeared in last year's iPhone XR.
(Ars Technica may earn compensation for sales from links on this post through affiliate programs.)
The company also says that this chip is much more power efficient, leading to better battery life. And on the subject of batteries, regulatory filings have indicated that the iPhone 11 has a 3,110mAh battery, up from 2,942mAh in the XR. Teardowns found that the iPhone 11 has 4GB of RAM—the same as is seen in the more expensive iPhone 11 Pro and 11 Pro Max, and up from 3GB in the XR.

On the wireless front, we've got a claim of gigabit LTE, plus Wi-Fi 6 and Bluetooth 5.0. The iPhone 11 also has the U1 chip we discussed in our iPhone 11 Pro review; this chip makes the phone location-aware in relation to other wireless devices nearby. Right now, the only feature that taps this is the ability to AirDrop files to another recent iPhone by physically orienting your iPhone 11 toward the target device. But there will likely be more uses for this chip in the future.

Apple has introduced spatial audio for the iPhone this year. It provides a fuller, deeper sound field than before, with Dolby Atmos support. You'll still probably want to use headphones, but it's a huge improvement over the XR's sound system.

We'll go over camera specs in the camera section of the review, since photography is a key focus of this update—in fact, the camera system is one of the only things that's substantially different from the iPhone XR we reviewed last year.

Design

Everything about the iPhone 11 looks identical to the iPhone XR except for two things: the camera system on the back, and new color options.

Colors include red, yellow, black, white, purple, and green—many of which have an almost '90s-throwback light shade to them. Our review unit is the classic black. Like the XR, the iPhone 11 has a glossy glass back that loves to attract fingerprints as quickly and as prolifically as possible. The iPhone 11 Pro phones that we reviewed earlier this week have a new, matte finish for the back that is a little less prone to that problem—though they are still made of glass.

Apple says the iPhone 11's glass back is more durable than what we got in last year's phones. But it's still glass, even if that glass is particularly strong, and damage from a drop onto a hard surface like concrete remains a risk. These phones are nigh-impossible for a user to repair should a break like that occur, and because of the way they're made, repairs from an Apple-certified repair shop or the Apple Store involve replacing huge portions of the phone to fix some pretty basic things. So you're looking at high repair costs if you don't also spring for AppleCare+.

The iPhone 11 also sports water resistance at up to two meters of depth for up to 30 minutes, another improvement over the XR.

The camera on the back has a completely new look. Whereas the iPhone XR had one camera, this one has two: a wide-angle (returning) and an ultra-wide-angle (new). The two lenses are aligned vertically and placed inside of a large-ish, rounded square of glass protruding from the back of the phone ever-so-slightly. Apple is keen to point out that both the camera bump and the rest of the back are "precision-milled from a single sheet of glass," and the glass does look handsome when you're up close.

That said, I personally feel the camera bump itself looks weird on the iPhone 11—moreso than in the Pro models. I think it's because the two lenses only occupy half of the square-shaped bump, and while there are a couple other components on the other side (like the flash), it looks lopsided and seems like it might not have been necessary have this entire square in place. Something more like what we saw with the two-camera systems in the iPhone X and XS phones would have looked a little more graceful.

I also feel that the iPhone XR is just kind of bulky. It's not a very elegant-looking device; it's price over form here, with a lot of tiny compromises to bring the costs down but actually add up in terms of aesthetic experience. Of course, that sort of thing is subjective, and it's also not really that important in the grand scheme.

Other than these notes, the iPhone 11 looks identical to the iPhone XR, the design of which we talked about at length in our review last year.

Camera

The biggest changes the iPhone 11 introduces over the iPhone XR are in the various cameras on the device. On the back, we have two 12-megapixel cameras, up from one in the XR. The 12MP, wide-angle lens with a ƒ/1.8 aperture returns, but it's joined by a 12MP, ƒ/2.4 aperture ultra-wide-angle lens with a 120° field of view. This allows taking photos show much more in cramped spaces—or just in any space, really—than the wide-angle lens allowed. We'll take a look at that more closely momentarily.

A new video feature called QuickTake lets you take a short video simply by holding your finger down on the shutter button to start recording, then letting go to stop. And Apple has made big improvements to the front-facing camera. It's gone from 7MP to 12MP and supports 4K video at up to 60 frames per second (up from 1080p). It also supports slow-motion video (previously only supported on the rear cameras), so you can take "slofies" at 1080p and 240fps.

The story here is that, at this lower-than-flagship price point (although this price point used to be a flagship price point before the sticker prices started going up over the past couple of years, but I digress), many Android options offered better camera systems than the XR offered. Apple is closing the gap here with improvements in both software and hardware.

For example, the Google Pixel 3 offered a feature called Night Sight that enhanced images taken in low-light situations to be much more readable. The feature also removed noise and brightened things up while maintaining or even introducing attractive-looking contrast. Apple has answered that here with Night Mode, which does the same thing. Night Mode uses the wide-angle lens and requires you to hold the phone still for a period of time (you can define how long for different results), then produces a low-light image that doesn't look as terrible as smartphone camera low-light images historically have.

Here's an example take on the iPhone 11.

The new ultra-wide camera allows you to zoom out to 0.5x, from the usual 1x of the traditional wide-angle lens. This means you can capture more of a scene; you toggle between the two lenses by simply tapping a button in the Camera app. The transition uses some crazy machine-learning-driven techniques to make the transitions seamless and help you get a sense of which lens to use when, and it's pretty snazzy.

Here's what the difference looks like between the two zoom levels:

You shouldn't expect a huge difference in normal photos taken with the normal wide-angle camera compared to either last year's iPhone XR or this year's iPhone 11 Pro. We didn't have an XR on hand to test, but as you can see in the photos below, it's impossible to distinguish between the regular photos taken with the 11 and those taken with the 11 Pro. However, Apple has improved on Smart HDR this year, a computational photography feature that helps bring out contrast and colors in photos. The previous implementation sometimes did unreal-looking things with human faces, and Apple has improved on that in this iteration.

Since the iPhone XR only had one camera, it had to rely on a software solution to produce some of the Portrait Lighting effects that were introduced in 2017. I'm not a fan of Portrait Lighting even on the high-end phones, and I didn't think it looked good on the XR. With this second camera, Apple seems able to get some depth information, because Portrait Lighting has improved.

It's still not a very attractive feature, though, as the images are often full of odd errors around things like hair or glasses. Apple has nonetheless added Key Light Mono, a new Portrait Lighting effect that puts a white background behind the target in a monochromatic photo.

And everything I said in the iPhone 11 Pro review about the upsides and downsides of this machine learning and ISP-driven photography stands for the iPhone 11, too.

The A13 and its components, along with Apple's software, are making a lot of decisions for you about how the image should look by default. The results are striking, and smartphone photos look better than they ever had before because of these techniques. But if you're looking to take a nice, clean image without any computational magic going on, you're generally going to be out of luck.

I don't think most people will care, though. That criticism mattered more for the iPhones Apple called "Pro." In this case, it fits the product: these features allow non-photographers to use a device that is not a professional-quality camera to take photos that most of the time look better than amateurs have been able to achieve before.

It's not unique to Apple's phones—Google and its OEMs are doing similarly impressive work over on the Android side—but that doesn't matter. If you're buying a flagship-or-close-to-it smartphone today, there's some cool photography stuff going on for amateur picture-takers.

Software

The iPhone XR ships with iOS 13 (possibly iOS 13.1 by now), Apple's latest mobile operating system. We wrote an extensive, detailed review of iOS 13 that you should check out if you want to learn about all the new features and how the system compares to alternatives.

The short version, though, is that iOS 13 remains one of the most elegantly designed operating systems in the industry, and that—along with an extremely robust app and game ecosystem—is one of the main reasons consumers buy iPhones. iOS 13 introduced a number of new features for power users, such as deeper file management and improved text editing. It also shipped with a number of bugs—so far, no common issues are major, but the polish isn't quite there.

iOS 13.1 was released shortly afterwards, and it addressed many but not all of the bugs. Still, we expect this annual update cycle of iOS to be a strong one as the small stuff gets worked out.

iOS is rivaled in the marketplace by Google's Android operating system, which offers users more control and customization in some areas. Android's app ecosystem has fewer restrictions on which apps may be distributed, and it has more powerful AI features, among other things. On the other hand, iOS offers much more robust longterm device support, a greater emphasis on user privacy, well-thought-out accessibility features, and other advantages. Both mobile platforms are strong in their own ways; the choice between them comes down to personal priorities and naturally won't be the same for every person.

Performance

As noted in the review for the iPhone 11 Pro, which has the same silicon, huge performance improvements aren't at the center of this update, and they don't need to be: last year's iPhones were already outperforming all the competition in the majority of benchmarks and use cases. But the A13 does knock things up a notch.

CPU performance is up around 15% in most tests, while the GPU saw bigger gains. This is a great phone to play games on or to try AR experiences with, there's no question about that.

Battery life

The iPhone XR already had the best battery life of any iPhone to date, so it's not surprising that the iPhone 11 doesn't claim to improve over its predecessor as much as the iPhone 11 Pro did over the iPhone XS. We didn't have an XR to test at this time, but we compared it against the iPhone 11 Pro, 11 Pro Max, and XS in our WebGL browser test, and it sits in relation to those about as much as promised and expected.

The iPhone 11 is capable of fast-charging from the right power adapters, but unfortunately, it doesn't come with one. It still comes with the 5W adapter that has been standard in iPhones for ages. That's a shame—that charger isn't enough for a battery with this capacity. It's going to take an awfully long time to charge this phone. The new iPhone 11 Pro models come with more efficient chargers, and it's disappointing that those chargers didn't come to this phone as well. Having an adequate charger seems to me like it should be a basic standard, not a premium benefit.

The most popular iPhone

Apple CEO Tim Cook has said that the iPhone XR was Apple's most popular iPhone last year, and I expect that baton to be passed to the iPhone 11 this year.

Now seems like as good a time as any to note that Apple's iPhone lineup is looking more appealing than it has for the past couple of years. That's because there are four strong choices—the iPhone 8, the iPhone XR, the iPhone 11, and the iPhone 11 Pro—at price points across a range of a thousand dollars, all the way from $449 to $1449. Starting at $699 (though that's for 64GB, which is not going to be enough for everyone), the iPhone 11 arguably sits at the sweet spot.

It improves on the slightly cheaper iPhone XR in noteworthy ways. Yet the only major downsides for this phone as compared to the much, much more expensive iPhone 11 Pro models are a markedly inferior screen, a slightly bulkier and less flashy design, and the lack of a telephoto camera lens. (It also doesn't get some LTE speed increases that Apple brought to the Pro models.) That might sound like a long list, but none of them is going to be particularly consequential for most people.

If you're considering upgrading from an iPhone 7 or earlier, the iPhone 11 is a dramatic step up in every respect, provided you don't mind having a much larger phone. If you want a smaller phone, the iPhone 8 is still an attractive buy for those who are coming from older phones, though it lacks many of the nifty new features introduced in the X-series phones. And if you want all the bells and whistles of Apple's iPhone X-derived modern lineup, but camera features aren't as important to you, the iPhone XR is also an option at a lower price than the iPhone 11.

I still think Apple needs an SE-like one-handed phone with modern tech in its lineup, and I'd like to see the company offer a version of the iPhone that does not have the disaster-prone glass back. But those omissions aside, iPhone buyers have more choices than they have in a while. And amidst that, I think this is the phone the majority of consumers are going to buy. Yes, the iPhone 11 Pro is outstanding. But it's too expensive for the majority of consumers.

If you're looking to live in Apple's mobile ecosystem, but you don't care about bleeding-edge OLED displays or attention-grabbing designs and premium materials, this is the way to go. Like the iPhone XR last year, we're giving it the Ars Approved badge and recommending it as the iPhone to buy for most people. Just be ready to spend a little more than the price of the phone on extras like AppleCare+, protective cases, or AirPods if you want the best experience.

The Good

  • It's a little cheaper than last year's XR, but it offers all the same features and more
  • The new ultra-wide-angle camera is both impressive and useful
  • It has the same performance as Apple's flagships this year—far better than any Android phone at this price point
  • iOS 13 is a strong mobile operating system with a vibrant app and game ecosystem
  • Improves on the battery life of last year's longest-lasting iPhone
  • A greater emphasis on user privacy and security than most competing phones

The Bad

  • It's made of fragile glass and can generally only be repaired by Apple at great expense (unless you buy AppleCare+)
  • Its design is bulky and a little inelegant, with an odd-looking camera system
  • The cheap price is undermined by the fact that you might want to consider AppleCare+—and wireless headphones, if you don't already have them
  • LTE speeds lag well behind the competition and even behind Apple's iPhone 11 Pro models
  • The included power adapter is inadequate

The Ugly

  • The screen is unimpressive, with a low resolution and relatively poor contrast (color accuracy is good, though)

Let's block ads! (Why?)


https://arstechnica.com/gadgets/2019/09/iphone-11-review-the-sweet-spot-iphone/

2019-09-29 12:00:00Z
52780396660096

Algorithms help robot dogs trot more like real animals - Engadget

Sponsored Links

Peter Means/Virginia Tech

Robot dogs can move efficiently, but not all that naturally -- and no, twerking doesn't count. Virginia Tech researchers think they can do better. They're developing a combination of algorithms and sensors that help robots move with gaits more like those of real animals. The system mimics the behavior of vertebrates, whose balance control comes largely from oscillating neurons in the spinal cord, using a combination of encoder sensors (to read relative positions for joints) and inertial measurement units (to measure the body's orientation relative to the ground). The result is a mechanical canine that can walk, run and trot with more grace and speed than usual.

Cameras and LiDAR are also present to help robots avoid collisions. This doesn't require dramatic changes to the bots themselves, at least. The test units are Ghost Robotics designs augmented with sensors to test the new algorithms.

The initial work has proven fruitful, but there's a lot of work left before you could see this in robots beyond the lab. Assistant professor and key researcher Kavel Hamed also stressed that it wasn't just about making the algorithms more effective -- they also have to be genuinely "bio-inspired." As such, it could be a while before there's a pet robot that moves just as smoothly as the real thing.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.
Comment
Comments
Share
Tweet
Share
Save

Let's block ads! (Why?)


https://www.engadget.com/2019/09/29/robot-dog-natural-movement-algorithm/

2019-09-29 08:00:02Z
CAIiED6WgNzWifpREhMdAA8cF-wqGAgEKg8IACoHCAowwOjjAjDp3xswicOyAw

Sabtu, 28 September 2019

Elon Musk to Unveil SpaceX's New Starship Design Tonight. Here's What to Expect - Space.com

It's that time again.

Elon Musk will unveil the latest design of SpaceX's Starship Mars-colonization architecture tonight (Sept. 28) during a presentation at the company's South Texas facilities, near the village of Boca Chica. 

The talk, which will occur at 8 p.m. EDT (7 p.m. CDT, 0000 GMT), will be streamed live online. You can watch it live here at start time, as well as on Space.com's homepage. You can watch the livestream directly from SpaceX here.

The billionaire entrepreneur has given such an update every September since 2016. Much has changed since then, including the architecture's name, which shifted from the Interplanetary Transport System to the BFR to the current moniker, Starship and Super Heavy.

More: SpaceX Finishes Assembling New Starship Prototype (Photo)
Related:
SpaceX's Starship and Super Heavy Mars Rocket in Pictures

Then there's size. Musk said in 2017 that the BFR will stand 348 feet (106 meters) tall. But in the tweaked design he revealed last year, the system had grown to a towering 387 feet (118 m).

The basic design concept has held firm, however: a two-stage system that consists of a passenger-carrying vehicle (Starship in the latest iteration) stacked atop a huge rocket (Super Heavy). Both elements will be fully and rapidly reusable, Musk has said.

Starship and Super Heavy will both be powered by SpaceX's next-generation Raptor engine. The stainless-steel, 100-passenger ship will have six Raptors, whereas the first-stage rocket will boast 35 of the engines. 

Or so we think now; we'll have to wait until tomorrow evening to hear if those numbers have changed.

Musk will have a nice visual aid at hand during the presentation: the newly assembled Starship Mk1, a three-engine prototype that SpaceX plans to fly for the first time in October. The Mk1, which stands 165 feet (50 m) tall, will first aim for an altitude of 12 miles (20 kilometers) and eventually conduct orbital test flights, Musk has said.

SpaceX is also building a similar vehicle, Starship Mk2, at the company's Florida facilities. The competition between the two construction efforts should end up improving the final Starship design, Musk has said.

The final Starship could take to the skies very soon, if the testing campaign continues to go well. (SpaceX has already retired its first prototype, the stubby, one-engine Starhopper vehicle.) The Starship-Super Heavy duo may start launching communication satellites as early as 2021, SpaceX representatives have said.

And Japanese billionaire Yusaku Maezawa has booked a crewed flight around the moon aboard the system, with a target launch date of 2023.

Editor's note: This story was updated to include SpaceX's webcast information for Elon Musk's Starship update.

Mike Wall's book about the search for alien life, "Out There" (Grand Central Publishing, 2018; illustrated by Karl Tate), is out now. Follow him on Twitter @michaeldwall. Follow us on Twitter @Spacedotcom or Facebook

All About Space banner

(Image credit: All About Space magazine)

Let's block ads! (Why?)


https://www.space.com/elon-musk-starship-design-update-2019-preview.html

2019-09-28 13:43:00Z
52780395148987

Apple's 7th-gen iPad gets bigger but keeps the same size battery - Engadget

Sponsored Links

iFixit

In case you forgot, the iPhone 11 and Apple Watch weren't the only new hardware Apple showed off at its big event a couple of weeks ago, it also upgraded the base iPad line. Now in its seventh generation, the "most popular" iPad that Apple sells has grown from 9.7- to 10.2-inches, ships with iPadOS and added a connector to support the company's still-pricey keyboard add-on.

The folks at iFixit attacked the new model with their assortment of tools, and found that despite the new size, inside it's still very similar to the previous model. Unlike the iPhone 11 Pro Max, for example, which made room for a larger battery than ever before, this new iPad has a unit that's the same size as its predecessor at 8,827mAh or 32.9 watt hours, and presumably relies on other tweaks to the hardware and software to achieve its extra hour of estimated battery life.

Gallery: Apple iPad 7th Gen | 7 Photos

The new iPad does include 3GB of RAM, an extra gig compared to the sixth gen models, and nice to have at its $329 starting price. The display is obviously larger, and iFixit notes that it's still set up for easier replacements than the unit used on Apple's Pro tablets, if you're into DIY repairs. The iPad doesn't make for as exciting of a teardown as smaller units, but it's still new for 2019, so take a peek at the inside below.

Source: iFixit
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.
Comment
Comments
Share
Tweet
Share
Save

Let's block ads! (Why?)


https://www.engadget.com/2019/09/28/ipad-7th-generation-teardown/

2019-09-28 10:09:29Z
CAIiEH5TuzlS4LWmJe1ZksBY90UqGAgEKg8IACoHCAowwOjjAjDp3xswpuqvAw

Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer - Ars Technica

The bootrom of an Apple Watch Series 3, as shown through a hex viewer. Yep, Apple Watches series 1, 2, and 3 are also vulnerable to Checkm8.
Enlarge / The bootrom of an Apple Watch Series 3, as shown through a hex viewer. Yep, Apple Watches series 1, 2, and 3 are also vulnerable to Checkm8.

Often, when new iOS jailbreaks become public, the event is bitter-sweet. The exploit allowing people to bypass restrictions Apple puts into the mobile operating system allows hobbyists and researchers to customize their devices and gain valuable insights be peeking under the covers. That benefit is countered by the threat that the same jailbreak will give hackers a new way to install malware or unlock iPhones that are lost, stolen, or confiscated by unscrupulous authorities.

On Friday, came the release of Checkm8. Unlike just about every jailbreak exploit released in the past nine years, it targets the iOS bootrom, which contains the very first code that’s executed when an iDevice is turned on. Because the bootrom is contained in read-only memory inside a chip, jailbreak vulnerabilities that reside here can’t be patched.

Checkm8 was developed by a hacker who uses the handle axi0mX. He’s the developer of another jailbreak-enabling exploit called alloc8 that was released in 2017. Because it was the first known iOS bootrom exploit in seven years, it was of intense interest to researchers, but it worked only on the iPhone 3GS, which was seven years old by the time alloc8 went public. The limitation gave the exploit little practical application.

Checkm8 is different. It works on 11 generations of iPhones, from the 4S to the X. While it doesn’t work on newer devices, Checkm8 can jailbreak hundreds of millions of devices in use today. And because the bootrom can’t be updated after the device is manufactured, Checkm8 will be able to jailbreak in perpetuity.

I wanted to learn how Checkm8 will shape the iPhone experience—particularly as it relates to security—so I spoke at length with axi0mX on Friday. Thomas Reed, director of Mac offerings at security firm Malwarebytes, joined me. The take-aways from the long-ranging interview are:

  • Checkm8 requires physical access to the phone. It can’t be remotely executed, even if combined with other exploits
  • The exploit allows only tethered jailbreaks, meaning it lacks persistence. The exploit must be run each time an iDevice boots.
  • Checkm8 doesn’t bypass the protections offered by the Secure Enclave and Touch ID.
  • All of the above means people will be able to use Checkm8 to install malware only under very limited circumstances. The above also means that Checkm8 is unlikely to make it easier for people who find, steal or confiscate a vulnerable iPhone, but don’t have the unlock PIN, to access the data stored on it.
  • Checkm8 is going to benefit researchers, hobbyists, and hackers by providing a way not seen in almost a decade to access the lowest levels of iDevices.

Read on to hear, in axi0mX’s own words, why he believes this is the case:

Dan Goodin: Can we we start with the broad details? Can you describe at a high level what Checkm8 is, or what it is not?

axi0mX: It is an exploit, and that means it can get around the protection that Apple built into the bootrom of most recent iPhones and iPads. It can compromise it so that you can execute any code at the bootrom level that you want. That is something that used to be common years ago, during the days of the first iPhone and iPhone 3G and iPhone 4. There were bootrom exploits [then] so that people could jailbreak their phone through the bootrom and that later would not be possible.

The last bootrom exploit that was released was for iPhone 4 back in 2010, I believe by Geohot. After that, it was not possible to exploit an iPhone at this level. All the jailbreaks [that] were done later on, [happened] once the operating system boots. The reason that bootrom is special is it’s part of the chip that Apple made for the phone, so whatever code is put there in the factory is going to be there for the rest of its life. So if there is any vulnerability inside the bootrom it cannot be patched.

Persistence and Secure Enclave

DG: When we talk about things that aren't patchable, we’re talking about the bug. What about the change to the device itself. Is that permanent, or once the phone is rebooted, does it go back to its original state?

A: This exploit works only in memory, so it doesn’t have anything that persists after reboot. Once you reboot the phone ... then your phone is back to an unexploited state. That doesn’t mean that you can’t do other things because you have full control of the device that would modify things. But the exploit itself does not actually perform any changes. It’s all until you reboot the device.

DG: In a scenario where either police or a thief obtains a vulnerable phone but doesn’t have an unlock PIN, are they going to be helped in any way by this exploit? Does this exploit allow them to access parts of this phone or do things with this phone that they couldn’t otherwise do?

A: The answer is it depends. Before Apple introduced the Secure Enclave and Touch ID in 2013, you didn’t have advanced security protections. So, for example, the [San Bernardino gun man’s] phone that was famously unlocked [by the FBI]—the iPhone 5c— that didn’t have Secure Enclave. So in that case this vulnerability would allow you to very quickly get the PIN and get access to all the data. But for pretty much all current phones, from iPhone 6 to iPhone 8, there is a Secure Enclave that protects your data if you don’t have the PIN.

My exploit does not affect the Secure Enclave at all. It only allows you to get code execution on the device. It doesn’t help you boot towards the PIN because that is protected by a separate system. But for older devices, which have been deprecated for a while now, for those devices like the iPhone 5, there is not a separate system, so in that case you could be able to [access data] quickly [without an unlock PIN].

DG: So this exploit isn’t going to be of much benefit to a person who has that device [with Secure Enclave] but does not have the PIN, right?

A: If by benefit you mean accessing your data, then yes that is correct. But it’s still possible they might have other goals than accessing your data, and in that case, it’s possible they would get some benefit.

DG: Are you talking about creating some sort of backdoor that once the owner puts in a PIN it would get sent to the attacker, or a scenario like that?

A: If, say, for example, you leave your phone in a hotel room, it's possible that someone did something to your phone that causes it to send all of the information to some bad actor’s computer.

DG: And that would happen after the legitimate owner returned and entered their PIN?

A: Yes, but that’s not really a scenario that I would worry much about, because attackers at that level … would be more likely to get you to go to a bad webpage or connect to a bad Wi-Fi hotspot in a remote exploit scenario. Attackers don’t like to be close. They want to be in the distance and hidden.

In this case [involving Checkm8], they would have to physically hold your device and their hand and would have to connect a cable to it. It requires access that most attackers would like to avoid.

This attack does not work remotely

DG: How likely or feasible is it for an attacker to chain Checkm8 to some other exploit to devise remote attacks?

A: It’s impossible. This attack does not work remotely. You have to have a cable connected to your device and put your device into DFU mode, and that requires you to hold buttons for a couple seconds in a correct way. It’s something that most people have never used. There is no feasible scenario where someone would be able to use this attack remotely.

If you want to talk [about] really hypothetical situations, if you’re a jailbreaker and you’re trying to use your exploit on your own computer and somehow your computer is compromised, it’s possible someone on your computer is going to deliver a different version of the exploit that does more stuff than what you want to do. But that is not a scenario that’s going to apply to most people. That is a scenario that is simply not practical.

Thomas Reed: Does the bootrom code that’s loaded into RAM get modified by the exploit, or is that not a requirement? Through this vulnerability would you need to make modifications to the bootrom code that’s loaded into RAM, or would that not be a factor, would that not be involved in the way the exploit works? I’m under the assumption that some of the code from the bootrom is loaded into RAM when it’s executed. Maybe I’m wrong about that.

A: The correct answer is that it’s complicated. The code that is used by the bootrom is all in read-only memory. It doesn’t need to get copied in order for it to be used. In order for my device to be able to do what I want, I want to also inject some custom code. In that case, I can’t write my code into the read-only memory, so my only option is to write it into RAM or in this case SRAM—which is the low-level memory that is used by the bootrom—and then have my injected code live in this small space. But the actual bootrom code itself does not get copied in there. It’s only the things that I added to my exploit.

TR: Can this be used to install any other code, any other programs that you wanted, with root-level permissions, so that you could install malware through this?

A: The correct answer is: it depends. When you decide to jailbreak your phone using this exploit, you can customize what Apple is doing. Apple has some advanced protections. A lot of their system is set up so that you don’t have malware running. If you decide to jailbreak, you’re going to get rid of some of the protections. Some people might make a jailbreak that keeps a lot of those protections, but it also allows you to remove protections. Other people might remove all protections altogether.

The jailbreak that you can make with this exploit always requires you to exploit the device fresh after reboot. So if you don’t use the exploit, your device will only boot to a clean install [version] of iOS. It’s not like you can install malware once and then have it stay forever if you’re not using the exploit because iOS has protections against that.

More about persistence

DG: Somebody could use Checkm8 to install a keylogger on a fully up-to-date iOS device, but the second that they rebooted the phone, that keylogger would be gone, right?

A: Correct. Or it wouldn’t work. They left the keylogger there, but iOS would just say: “This app is not authorized to run on this phone so I’m not going to run it.”

iOS devices have what’s called a secure bootchain. Starting from the bootrom, every single step is checked by the previous stage so that it is trusted. It always has a signature verified so that the phone only allows you to run software that is meant to be running. If you choose to break that chain of trust and run software that you want to run then exactly what you do will determine what else can happen. If you choose to not break the chain of trust and you simply use your phone the way that Apple wants you to use it, without jailbreaking it, then this chain of trust is secure. So malware will not be able to get around it the next time you boot your phone, because you are relying on the chain of trust.

You cannot actually persist using this exploit. The only way that you can break the chain of trust is if you manually do it every boot. So you have to be in DFU mode when you boot and then you have to connect a cable to your phone and then you have to run the exploit in order to jailbreak your phone. At that point you can do whatever you want. But in no case will that be the case if you…just boot normally. In that sense, it is not persistent.

TR: In the case of a company like Cellebrite or Greyshift getting your device and they want to capture data from it, as I understand it if you don’t have the key—which you wouldn’t because it’s in the Secure Enclave—a lot of the data is going to be encrypted and it’s not going to be accessible. It sounds like Checkm8 really wouldn’t be of much use to them. Is that correct, or would there be some things that they could do with it?

A: As a stand-alone exploit, the answer is no, they can’t do much with it. But it’s possible, perhaps likely, that they would use more than one exploit—they have an exploit chain—in order to do what they want to do. And in that case, they could use this one instead of another one that they have because maybe it’s faster, maybe they don’t have to worry about protecting it. So it’s possible that this could serve as a step that they take in order to crack the PIN code.

This does not give them anything that would directly be able to guess the PIN code without other exploits. I don’t know what they have. It’s possible that they just have one thing that they use, and in that case they probably would not use this in any way. But it’s also possible that this could replace one of the bugs that they use in order to do whatever they’re doing.

TR: I think the appeal of that would be that it’s something that Apple can’t patch. If they had an exploit chain that would give them access to a lot of devices.

DG: So this is more of an incremental development [for Cellebrite and Grayshift] as opposed to a game changer?

A: I don’t think that they can do anything today with Checkm8 that they couldn’t do yesterday [without Checkm8]. It’s just that yesterday maybe they would do it a slightly different way. I don’t think they gain anything from this release.

DG: What is it about the newer chipsets that prevents Checkm8 from working? Is it possible someone could tweak Checkm8 to make it work on these newer chipsets?

A: I think it’s unlikely. There were changes to make [newer chipsets] not exploitable. All I know is I can’t get it to work. For me it’s not something that I can do. What I do involves using multiple bugs. Some that are not serious might be required to access other bugs that are more serious. Because Apple patched some bugs in the newer phones, it can no longer be exploited as far as I know.

DG: So you don’t see much chance that somebody is going to chain Checkm8 to something else and be able to achieve the same result with newer iPhones?

A: I can’t say it’s impossible, and there are some really good hackers out there. It’s always possible. I think it’s unlikely. I know I couldn’t do it. The chance is always there, but I think it’s very unlikely.

A jailbreaking renaissance

If you have a few minutes, I have more things that you may find interesting:

Apple has been making jailbreaks very difficult. Things were much better a couple years ago. Before about 2016 there were regular jailbreaks that worked well and a lot of people could jailbreak your phone. That changed with iOS 9, and jailbreaks no longer had persistence and they were not even reliable, so you would have to try a couple of steps before the jailbreak worked. Jailbreaking became inaccessible to people because you couldn’t get a phone, even an older phone, and jailbreak it, and customize it, and make software that changes things about the phone. People were saying jailbreaking is dead because it’s not what it used to be.

Now, the reason [Checkm8] is so great for iOS jailbreakers is people will be able to just get an iPhone X and then be able to jailbreak it on any [iOS] version. That is great because that means anyone can decide to jailbreak and sit down at their computer, connect their phone, and be jailbroken in not much time.

Now, what I released today doesn’t allow you to jailbreak your phone completely with Cydia and other things you would expect from a jailbreak, but that will come soon. And you will be able to jailbreak your phone pretty much anytime you want and on the latest version. And that latest version part is also important, because in the past when people were jailbreaking phones, they had to stay on an older version of the operating system in order for it to have the vulnerabilities that they were using to jailbreak.

But now, with this technique, you will be able to use the latest version of iOS and still jailbreak your phone because you can run any version of iOS you want, so you can always have the latest security patches. You don’t have to stay on an older version that has security vulnerabilities just so you can jailbreak, and you won’t have to wait until a jailbreak is available. This is going to make jailbreaking a lot more accessible and a lot safer for everyone. That is one of the reasons I am very excited about this work.

A small group of people enjoy jailbreaking and they do it for fun because they like to tinker with their phone, or change the way it looks, or hack it. But there’s another group of people where, say, there’s an incident where you believe your email was hacked and you want to find out what happened. In that case you want to be able to look at the storage on your phone and see what kind of artifact do you get, and what kind of log files, and analyze what’s there to see if you can identify what happened. And if you were, say, the victim of an attempted hack, or maybe if the hack was successful, in order to get this forensic copy you need to be able to access the storage on a low level that’s not possible unless you jailbreak your phone.

In the past couple years, you couldn’t just jailbreak the phone on the latest version of iOS if you needed to for any reason. You would have to let the phone sit until it was finally jailbreakable and only then would you be able to do it. That changes now. If you need to see what’s happening on your phone, you can just jailbreak it one time with Checkm8 and then get a full forensic copy of your data and your log files and history. That’s one scenario.

Monitoring in real time

The other scenario is: sometimes people want to look for attackers, or things happening in real time. Say you go to a website [and] your phone will send traffic to various webservers and various webservers will send back files. If you are doing tracking in real time, you can see what’s happening. If you want to, say, explore what happens when your phone goes to a website, you can’t do that if you don’t have a jailbreak because Apple doesn’t give you the specific permissions that you need to see things happening at such a low level on your phone.

Now, anytime you want, you will be able to jailbreak your phone, either one time, or every single time, you will be able to analyze what’s happening in real time. Say you have traffic that is connecting to your phone from some country you don’t think should be connecting, like Russia, then you would know that something is happening right away. And you would be able to see it and block it. For people who do research … it was impossible to do that on iOS. You would need to have your own custom jailbreak, or you would have to have an old version of iOS, or you would have to wait until a jailbreak is available.

The things I just mentioned are things that I’m quite excited about, because the iOS jailbreak community is great and they’re going to benefit from this. It’s also going to help people who want to research either the security of iOS or the security of apps they’re using. All of that is going to benefit for the next couple of years.

Let's block ads! (Why?)


https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains-why-idevice-jailbreak-exploit-is-a-game-changer/

2019-09-28 11:00:00Z
52780395387264

Apple's 7th-gen iPad gets bigger but keeps the same size battery - Engadget

Sponsored Links

iFixit

In case you forgot, the iPhone 11 and Apple Watch weren't the only new hardware Apple showed off at its big event a couple of weeks ago, it also upgraded the base iPad line. Now in its seventh generation, the "most popular" iPad that Apple sells has grown from 9.7- to 10.2-inches, ships with iPadOS and added a connector to support the company's still-pricey keyboard add-on.

The folks at iFixit attacked the new model with their assortment of tools, and found that despite the new size, inside it's still very similar to the previous model. Unlike the iPhone 11 Pro Max, for example, which made room for a larger battery than ever before, this new iPad has a unit that's the same size as its predecessor at 8,827mAh or 32.9 watt hours, and presumably relies on other tweaks to the hardware and software to achieve its extra hour of estimated battery life.

Gallery: Apple iPad 7th Gen | 7 Photos

The new iPad does include 3GB of RAM, an extra gig compared to the sixth gen models, and nice to have at its $329 starting price. The display is obviously larger, and iFixit notes that it's still set up for easier replacements than the unit used on Apple's Pro tablets, if you're into DIY repairs. The iPad doesn't make for as exciting of a teardown as smaller units, but it's still new for 2019, so take a peek at the inside below.

Source: iFixit
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.
Comment
Comments
Share
Tweet
Share
Save

Let's block ads! (Why?)


https://www.engadget.com/2019/09/28/ipad-7th-generation-teardown/

2019-09-28 09:34:20Z
CAIiEH5TuzlS4LWmJe1ZksBY90UqGAgEKg8IACoHCAowwOjjAjDp3xswpuqvAw