this post was submitted on 26 Oct 2023
161 points (95.0% liked)

Technology

58012 readers
2998 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Hackers can force iOS and macOS browsers to divulge passwords and much more::iLeakage is practical and requires minimal resources. A patch isn't (yet) available.

top 16 comments
sorted by: hot top controversial new old
[–] [email protected] 55 points 10 months ago (1 children)

While iLeakage works against Macs only when running Safari, iPhones and iPads can be attacked when running any browser because they’re all based on Apple’s WebKit browser engine.

This is one of the things with iOS , iPadOS that I really don’t like.

[–] [email protected] 7 points 10 months ago (1 children)

It is the single biggest reason why I havent thought about getting an iphone. I have an ipad and it is alright, but I have gone back to using the significantly worse specced Fire tablet, so I don't have to use Safari.

[–] [email protected] 3 points 10 months ago

If they'd just allow other browsers, I'd love to get an iPad for creative work and to watch movies and shows in bed. My laptop does the job right now, but it gets too hot on my lap

[–] [email protected] 16 points 10 months ago (1 children)

I would never store any passwords in any browser to be honest. It cannot be safe anyway.

[–] [email protected] 11 points 10 months ago

It's a hardware exploit. It can recover stuff in other tabs, a password was just one example they happened to catch. It's not targeted.

[–] [email protected] 13 points 10 months ago (2 children)

It’s feels like the article is intentionally vague about it but this does not seem to affect iCloud password keychain, as that requires user intervention (using your fingerprint) to fill your password, right?

[–] [email protected] 9 points 10 months ago (1 children)

Seems to affect Keychain yes. And there are even examples in the article with an external password manager (Lastpass) so it doesn’t seem to matter how. But to be fair the vulnerability is quite complicated to abuse and I guess we can expect a fix very soon.

[–] [email protected] 1 points 10 months ago

The vulnerability seems to be that it can read content filled into a page, and since lastpass will autofill your password (usually, if enabled) it’s easy to read.

iCloud Keychain requires user intervention by default (using your fingerprint) so it can’t be autofilled in the background.

Still, many people would be vulnerable because 3rd party password managers are so popular.

[–] [email protected] 6 points 10 months ago* (last edited 10 months ago) (2 children)

It looks to me pretty clear that they are talking about all the passwords stored in the browser.

[–] [email protected] 3 points 10 months ago (1 children)

Why people trust browsers for this? Also why browsers don’t beef of that security? I rely on third party, BitWarden, to store my stuff securely.

[–] [email protected] 1 points 10 months ago

I haven't read in details, but I believe this is an hardware issue, more than a strictly browser issue. They'll probably mitigate it on the browser side though

[–] [email protected] 1 points 10 months ago

I was talking about the iCloud Keychain, they are specifically not stored in the browser so malware can’t access it.

[–] [email protected] 6 points 10 months ago

This is the best summary I could come up with:


Researchers have devised an attack that forces Apple’s Safari browser to divulge passwords, Gmail message content, and other secrets by exploiting a side channel vulnerability in the A- and M-series CPUs running modern iOS and macOS devices.

The researchers have successfully leveraged iLeakage to recover YouTube viewing history, the content of a Gmail inbox—when a target is logged in—and a password as it’s being autofilled by a credential manager.

Once visited, the iLeakage site requires about five minutes to profile the target machine and, on average, roughly another 30 seconds to extract a 512-bit secret, such as a 64-character string.

“In particular, we demonstrate how Safari allows a malicious webpage to recover secrets from popular high-value targets, such as Gmail inbox content.

Finally, we demonstrate the recovery of passwords, in case these are autofilled by credential managers.”

The design of A-series and M-series silicon—the first generation of Apple-designed CPUs for iOS and macOS devices respectively—is the other.


The original article contains 327 words, the summary contains 157 words. Saved 52%. I'm a bot and I'm open source!

[–] [email protected] 6 points 10 months ago (1 children)
[–] [email protected] 3 points 10 months ago

iHaveUrPass

[–] [email protected] 4 points 10 months ago* (last edited 10 months ago)

Why is the content in this screenshot slightly off: https://cdn.arstechnica.net/wp-content/uploads/2023/10/gmail-content-recovery-640x277.jpg ? In the demo videos the retrieved content is always 100% accurate.