Print this out and you can take notes on the back of the page, or even read it if you get bored while you're out and about without your device, to remind yourself why you don't really need your phone:
> Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones
> Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick
I can't emphasize this enough: it is extraordinarily rare for malware to persist after a reboot on iOS. These examples are of devices that faked the shutdown sequence (in other words, the exploit did not achieve persistence). iPhones have a hardware-level reset capability: quickly press volume up, volume down, then press and hold the power button.
Enable Lockdown Mode to prevent the vast majority of exploits, then reboot using this method once a week. You'll be fine, as far as this specific threat is concerned.
https://fr.wikipedia.org/wiki/Tourne-montre
Print this out and you can take notes on the back of the page, or even read it if you get bored while you're out and about without your device, to remind yourself why you don't really need your phone:
> Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones
> Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick
https://arxiv.org/abs/2205.06114 | https://doi.org/10.48550/arXiv.2205.06114
Previously on HN:
When Wireless Malware Stays on After Turning Off iPhones [pdf] - https://news.ycombinator.com/item?id=31364849 May 2022 (5 comments)
You might have already heard about this news from Mental Outlaw:
iPhones Could Still Be Attacked (Even When Powered Off) - https://www.youtube.com/watch?v=mwrjT8hxGzM