Hackers can force iOS and macOS browsers to divulge passwords and much more::iLeakage is practical and requires minimal resources. A patch isn’t (yet) available.

  • @fuggadihere@lemmy.world
    link
    fedilink
    English
    551 year ago

    While iLeakage works against Macs only when running Safari, iPhones and iPads can be attacked when running any browser because they’re all based on Apple’s WebKit browser engine.

    This is one of the things with iOS , iPadOS that I really don’t like.

    • @OrgunDonor@lemmy.world
      link
      fedilink
      English
      71 year ago

      It is the single biggest reason why I havent thought about getting an iphone. I have an ipad and it is alright, but I have gone back to using the significantly worse specced Fire tablet, so I don’t have to use Safari.

      • @kboy101222@lemm.ee
        link
        fedilink
        English
        31 year ago

        If they’d just allow other browsers, I’d love to get an iPad for creative work and to watch movies and shows in bed. My laptop does the job right now, but it gets too hot on my lap

  • @Tetsuo@jlai.lu
    link
    fedilink
    English
    161 year ago

    I would never store any passwords in any browser to be honest. It cannot be safe anyway.

    • lemmyvore
      link
      fedilink
      English
      111 year ago

      It’s a hardware exploit. It can recover stuff in other tabs, a password was just one example they happened to catch. It’s not targeted.

  • @ilega_dh@feddit.nl
    link
    fedilink
    English
    131 year ago

    It’s feels like the article is intentionally vague about it but this does not seem to affect iCloud password keychain, as that requires user intervention (using your fingerprint) to fill your password, right?

    • @Vub@lemmy.world
      link
      fedilink
      English
      91 year ago

      Seems to affect Keychain yes. And there are even examples in the article with an external password manager (Lastpass) so it doesn’t seem to matter how. But to be fair the vulnerability is quite complicated to abuse and I guess we can expect a fix very soon.

      • @ilega_dh@feddit.nl
        link
        fedilink
        English
        11 year ago

        The vulnerability seems to be that it can read content filled into a page, and since lastpass will autofill your password (usually, if enabled) it’s easy to read.

        iCloud Keychain requires user intervention by default (using your fingerprint) so it can’t be autofilled in the background.

        Still, many people would be vulnerable because 3rd party password managers are so popular.

    • @Zeth0s@lemmy.world
      link
      fedilink
      English
      6
      edit-2
      1 year ago

      It looks to me pretty clear that they are talking about all the passwords stored in the browser.

      • bean
        link
        fedilink
        English
        31 year ago

        Why people trust browsers for this? Also why browsers don’t beef of that security? I rely on third party, BitWarden, to store my stuff securely.

        • @Zeth0s@lemmy.world
          link
          fedilink
          English
          11 year ago

          I haven’t read in details, but I believe this is an hardware issue, more than a strictly browser issue. They’ll probably mitigate it on the browser side though

      • @ilega_dh@feddit.nl
        link
        fedilink
        English
        11 year ago

        I was talking about the iCloud Keychain, they are specifically not stored in the browser so malware can’t access it.

  • AutoTL;DRB
    link
    English
    61 year ago

    This is the best summary I could come up with:


    Researchers have devised an attack that forces Apple’s Safari browser to divulge passwords, Gmail message content, and other secrets by exploiting a side channel vulnerability in the A- and M-series CPUs running modern iOS and macOS devices.

    The researchers have successfully leveraged iLeakage to recover YouTube viewing history, the content of a Gmail inbox—when a target is logged in—and a password as it’s being autofilled by a credential manager.

    Once visited, the iLeakage site requires about five minutes to profile the target machine and, on average, roughly another 30 seconds to extract a 512-bit secret, such as a 64-character string.

    “In particular, we demonstrate how Safari allows a malicious webpage to recover secrets from popular high-value targets, such as Gmail inbox content.

    Finally, we demonstrate the recovery of passwords, in case these are autofilled by credential managers.”

    The design of A-series and M-series silicon—the first generation of Apple-designed CPUs for iOS and macOS devices respectively—is the other.


    The original article contains 327 words, the summary contains 157 words. Saved 52%. I’m a bot and I’m open source!