toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

214
active users

#touchid

0 posts0 participants0 posts today
Continued thread

Hmm, yeah... that metal bit I ripped off the logic board (the one that looked like it was on the same circuit as the antenna connector) may have been important. I don't think I'm getting any Bluetooth signal.

Works when plugged in though, so I guess other than that there's nothing really wrong with it. #TouchID #Mac #Apple

Continued thread

A little surprised to report that it all works. There may have been some indelicate handling of parts.

More notes:

New soldering iron tips probably are coated with something, so clean them before you go to melt plastic with them.

I couldn’t get the Lightning connector very secure by melting the plastic pegs, so ended up also hot gluing. Do this with a cable plugged in so that it’s in the right position.

The power switch does not get reinstalled, but it all still works.

I had to drill out the mounting holes to get M2 screws to fit. My eBay miniature drill set came in handy here. A 2 mm bit should do.

You may need to reboot your Mac and/or physically plug it in. TouchID also might not work if the battery is too low?

Continued thread

The printed 2 mm pegs for the Lightning connector surprisingly worked. Unfortunately, the holes for the heat inserts are too small.

I also need a flat soldering iron tip to melt said pegs and secure the connector. I somehow don't have one. #TouchID #Mac #Apple

#TouchID Extraction complete.

Pro tips: there is a sticky bit on the battery opposite the connector. Pull that. It’s like a command strip. Then the battery will fall out.

The big ribbon connector has adhesive under it, so you will struggle if you just pull. It probably doesn’t matter if you wreck it because you won’t be using the keys anyway, but still.

Many, but not all, of the ribbon connectors have tiny retaining “gates”. Make sure you open them before trying to remove the cables.

#Mac #Apple

gist.github.com/KhaosT/1406a6b

Leaker über Faltbares iPhone: Schlank, langlebig und mit beeindruckender Akkulaufzeit
Apples erstes faltbares iPhone rückt in greifbare Nähe und verspricht, die Konkurrenz mit wegweisender Akkulaufzeit und einem schlanken Design heraus
apfeltalk.de/magazin/news/leak
#iPhone #News #Akkulaufzeit #Apple #Displays #FaltbaresIPhone #Innovation #IPhoneFold #Preis #SchlankesDesign #TitanGehuse #TouchID

My work Mac has a very secure password so I have enjoyed setting it up to use Touch ID for sudo. I have not enjoyed that that configuration gets blown away on every update.

However I have now discovered (2 years late) that instead of /etc/pam.d/sudo you can use sudo_local and have it survive OS updates.

idownloadblog.com/2023/08/24/t

iDownloadBlog.com · How to enable Touch ID for Terminal on a Mac to authenticate commands like ‘sudo’By Christian Zibreg

Apples erstes faltbares iPhone: Design, Preis und technische Details
Apple plant, sein erstes faltbares iPhone gegen Ende 2026 oder Anfang 2027 auf den Markt zu bringen. Analyst Ming-Chi Kuo gibt in seinem aktuellen Bericht neu
apfeltalk.de/magazin/news/appl
#iPhone #News #Apple #AppleFaltbaresDisplay #AppleFaltbaresSmartphone #AppleInnovation #AppleKI #FaltbaresIPhone #IPhone2026 #IPhoneFold #TitanIPhone #TouchID

Passkey/password bug: iOS 18.3.1

Ook in iOS versie 18.3.1 is de eerder door mij gemelde iCloud KeyChain (*) kwetsbaarheid nog niet gerepareerd (eerder schreef ik hierover, Engelstalig: infosec.exchange/@ErikvanStrat).

(*) Tegenwoordig is dat de app genaamd "Wachtwoorden" (of "Passwords").

De kwetsbaarheid bestaat indien:

• De eigenaar een "passcode" (pincode of wachtwoord) gebruikt om de iPhone of iPad te ontgrendelen - en er GÉÉN biometrie is geconfigureerd;

ofwel:

• De gebruiker wel biometrie kan gebruiken om het scherm te ontgrendelen, doch in 'Instellingen' > 'Touch ID en toegangscode' de instelling "Autom. invullen wachtw." is UITgezet.

Zie onderstaande screenshots (Engelstalig in infosec.exchange/@ErikvanStrat). Meer info ziet u door op "Alt" in de plaatjes te drukken.

Probleem: iedereen met toegang tot de ontgrendelde iPhone of iPad kan dan, *zonder* opnieuw lokaal te hoeven authenticeren:

1) Op elke website inloggen waarvan het user-ID en wachtwoord in iCloud Keychain zijn opgeslagen;

2) Met passkeys op enkele specifieke websites inloggen (waaronder account.apple.com en icloud.com), namelijk als volgt:

a) Open de website;
b) Druk op "Inloggen";
c) Druk op de "x" rechts bovenaan de pop-up die verschijnt (in de onderste schermhelft);
d) Druk kort in het veld waar om het e-mailadres gevraagd wordt;
e) Druk op de knop "gebruik passkey".

Risico: uitlenen van een unlocked iDevice (o.a. aan kinderen) maar ook diefstal nadat de passcode is afgekeken. Of als de dief geen passcode heeft, als deze wacht tot de eerstvolgende iOS/iPadOS kwetsbaarheid bekend wordt waarbij de schermontgrendeling omzeild kan worden.

Als u ze nog niet gezien heeft, bekijk in elk geval de eerste van de volgende twee video's van Joanna Stern (van de Wall Street Journal):
youtube.com/watch?v=QUYODQB_2wQ
youtube.com/watch?v=tCfb9Wizq9Q

@Cyberbeni : I'd not underestimate the number of users who do not use biometrics.

However, I just managed to reproduce the vulnerability *with* biometrics (Touch ID) enabled. It happens when I go to

Settings" —> "Touch ID & Passcode"

and disable "Password AutoFill" (see the relevant Settings screenshots below).

BTW I've only tested iPads and iPhones with TouchID (as I don't have access to Apple devices equipped with FaceID).

I just reproduced this on an iPhone SE2 with iOS 18.1.1 in Safari, then updated iOS to 18.2.1: it still reproduces.

It also works in Edge, Firefox and Firefox Focus, but (interestingly) not in Chrome (all for iOS of course).

Note: disabling Password Autofill may not be what the typical user does; I ran into it while experimenting with passkeys.

But then again, that setting is DISABLED if the user has not configured biometrics, and it, IIRC, cannot be enabled in that situation.

@ryanrowcliffe @rmondello

Replied in thread

@jpsachse : or when your account gets pwned and the attacker does a better job proving that they are you than you - after all, *they* have access to your account - while you do not.

🔸 ANDROID PASSKEY BLACK HOLE
*Or* when you press a button "Clear data" (at the bottom of chrome.google.com/sync) which is accompanied by the text:

« This will clear your Chrome data that has been saved in your Google Account. This might clear some data from your devices. »

For you to subsequently find out that ALL OF YOUR PASSKEYS on (all of) your Android device(s) are IRRETRIEVABLE GONE (I reported this to Google in June 2023 and published it 6 months later in
seclists.org/fulldisclosure/20). It's still unfixed.

🔸 WHY NO EXPORT AND NO BACKUP
W.r.t. being able to export and/or backup all private keys belonging to all of your passkeys: that's a big dilemma (depending on your POV).

The main (advertised, not taking into account a possibly desired vendor lock-in) reason is simple: if *you* have direct access to such private keys, *malware* running on your device does too.

The compromise is that they are automatically synced to your cloud account, and from there to other devices (of the same brand, provided they run an OS version that's not too old), including a new device if you brick or lose your old device.

However, if there's serious malware on your device, then, even if the malware authors cannot steal all of your passkeys (that is, their private keys), then you're toast anyway; a RAT such as AnyDesk may fool you into believing that you're logging in to website A while in fact it's B and they steal it's session cookie - and pwn the webaccount.

🔸 SYNCING PRIVATE KEYS
BTW it's hardly being discussed, but being able to synchronize secrets between secure hardware enclaves in such a way that *you* are denied access, is quite an achievement (considering that, if you buy a new phone, the only available secrets to the transport system are your definitely weak passcode, and your, potentially weak, cloud password that may be used to encrypt the private keys in transit).

I *know* that it's complicated because I accidentally found out around June 2023 that Android can get confused: passkeys *seem* to sync just fine, but passkeys created on phone 1 do not work on phone 2 and vice versa. Somehow the phones had started using *different* encryption keys used to securily synchronize them (I also mentioned that issue in my reports to Google in the summer of 2023, and I mention it in the FD (seclists.org) message).

I don't know how Apple syncs secrets in iCloud keychain, and neither whether a situation may exist where passkey's private keys sync but are unusable (like may happen when using Android).

🔸 APPLE'S OWN PASSKEY MISERY
However, Apple has got their own bunch of problems with passkeys being usable *without* requiring biometrics or a passcode to unlock them from iCloud Keychain, see infosec.exchange/@ErikvanStrat and follow-up (it gets worse every time I look at it) infosec.exchange/@ErikvanStrat (more details in earlier toots in that thread).

In short: if you don't use biometrics to unlock your iPhone or iPad (OR you do, but you have -unlikely- disabled a specific configuration setting), then anyone with access to your iDevice in an unlocked condition (*), can sign in to:
appleid.apple.com
and/or
icloud.com
WITHOUT entering your passcode (or using biometrics).

(*) your child, spouse, someone you don't know (well) who borrows your phone to make a call (because their's battery is dead), NOTABLY including a thief who stole it while you were using it (or saw you type your passcode and can unlock it by themselves: youtu.be/QUYODQB_2wQ).

I'm not sure yet, but this may even render Apple's anti-theft system totally moot.

@rmondello @johnbrayton
@agl

myaccount.google.comAccount settings: Your browser is not supported.
Replied in thread

@webhat : Passwordless actually exists on iPhone or iPad under realistic circumstances - that is, not taking into account unlocking the screen (using a PIN, a password or biometrics).

Consider the situation when some stranger borrows your iPhone to make a phone call, or you let your child play a game on your iPad: in such cases they may be able to log in as you onto various websites. That is, without knowing your screen unlock code (or somehow being able to simulate your biometrics).

On specific websites this even also works when using passkeys (no PIN, password or biometrics is required to use the passkey).

It obviously is a vulnerability. But after I filed a bug report in June 2023, Apple denied that it is. And they've not fixed it either.

BTW this works (on iPhone or iPad) in Safari, Firefox, Edge and Chrome (except that in Chrome, "passkey without local auth", only works if, in condition 3️⃣ below, only iCloud Keychain is enabled and no other 'optional' password manager - such as KeePassium).

The conditions are:

1️⃣ The password or passkey is stored in iCloud KeyChain;

2️⃣ EITHER: you've NOT configured any biometrics to unlock the screen (meaning that you must use a pincode or a password to unlock the screen - a use case quite common because some people don't like to use, or don't trust, biometrics),

OR: (not common, I found it during testing) 'Settings' > 'Touch ID and Passcode': 'Password Autofill' is OFF;

3️⃣ In 'Settings' > 'Passwords' > 'Password Options' (all quite common):
• 'Autofill Passwords and Passkeys' is ON;
• ' iCloud Keychain' is ON;
• Optionally another password manager is enabled (in my iPhone 'KeePassium' is ON).

4️⃣ Passkeys only: (this is irrelevant for passwords, and applies only to iOS and iPadOS versions that support passkeys): the website you (or the borrower of your iDevice) want to sign in to (using your account) must support "WebAuthn Conditional UI" [1] AND it must specify:
    'User Verification': 'Preferred'
(the latter value, stupidly, is the WebAuthn default; the other options are 'Discouraged' and 'Required').

[1] github.com/w3c/webauthn/wiki/E

In short, "WebAuthn Conditional UI" means that the website ALSO accepts a passkey in case you activate (tap in and see a blinking cursor) the user-ID input field (instead of tapping a button labeled e.g. "Sign in using passkey"). Doing that will invoke iCloud KeyChain and lets you select the right passkey.

Two examples (there are more) of such websites (for free testing purposes) are:
passkeys-demo.appspot.com
webauthn.io

AND, NOTABLY, Apple's production SSO site: https:⧸⧸idmsa.apple.com

Note that your browser is redirected to the idmsa site (in order to SSO to Apple) when you open the bugreport that I filed in June 2023:
security.apple.com/signin?path

Here's the recipe for passwords:

🔸 Ensure that conditions 1️⃣, 2️⃣ and 3️⃣ mentioned above are met;

🔸 Open a website where you have an account with it's credentials saved in iCkoud Keychain. Invoke the log in screen and tap into the user-ID field;

🔸Tap the proposed account name. Now iCloud Keychain autofills your user-ID and passwords into the right fields.

And the recipe for passkeys:

🔸 Ensure that conditions 1️⃣, 2️⃣, and 3️⃣ mentioned above are met;

🔸 Open security.apple.com/signin?path

🔸 A box pops up from the bottom of the screen. Tap the X at the top-right to close it.

🔸Tap in the input field "Email or Phone Number", then tap your iCloud ID at the bottom of your screen. Now you will be logged in to Apple without using local auth.

Note that you'll probably see a "403 access denied" error, because (although you HAVE logged in) you are not *authorized* to view te bug report.

This is passwordless 1FA because the possession of the (unlocked) device suffices.

GitHubExplainer: WebAuthn Conditional UIWeb Authentication: An API for accessing Public Key Credentials - w3c/webauthn
#Apple#iOS#iPhone

iPad mit Touch ID: ohne klicken durch Auflegen des Fingers zum Home-Bildschirm

Ein iPad mit Touch ID als Home-Button oder integriert in die Seitentaste, lässt sich durch Auflegen des Fingers direkt öffnen. Die Funktion «Zum Öffnen Finger auflegen» ist leider in den Bedienungshilfen versteckt und nicht standardmässig aktiv. Einstellungen → Bedienungshilfen →…

Artikel lesen: iphone-blog.ch/2024/07/16/ipad

Praktisch für die Ferien: iOS 18 erlaubt das Ausblenden von Apps

Urlaub, Ferien, Abwesenheit, abschalten, entspannen. Um gezielt von Benachrichtigungen Abstand zu nehmen, kann man sich den „Nicht stören“-Fokus aktivieren. Oder man blendet einzelne Apps aus. So kann ich in den Ferien mich von Slack, Teams oder Outlook trennen und werde bei eintreffenden Na…

Artikel lesen: iphone-blog.ch/2024/07/12/prak

Recently I switched from an #iPhone SE 2nd generation to an iPhone 15. The biometric identification system has therefore been changed from #touchID to #faceID. FaceID works quite well so far. It only reaches its limits in strong sunlight and during sport. It is particularly annoying to have to enter the PIN when doing #sport. It feels like this happens much more often with Face ID than it used to with Touch ID. #running #cycling

After finishing my #TouchID button (the wired version), I decided to design a wireless version, too. It uses the built in battery from the „Magic Keyboard with Touch ID“. The battery still can be charged through the Lightning port, but the button operates wireless.

The good thing of this design: It needs only 2 screws! 🤓

#3DPrint #3DPrinting #Shapr3D #TouchMagic

collaborate.shapr3d.com/v/zfsW

collaborate.shapr3d.comShapr3D WebviewerShare your designs with a single click.