Why iPhone Still Keeps Running Even Shutdown?
Why iPhone Still Keeps Running Even Shutdown?
- Why Enterprise RAID Rebuilding Succeeds Where Consumer Arrays Fail?
- Linus Torvalds Rejects MMC Subsystem Updates for Linux 7.0: “Complete Garbage”
- The Man Who Maintained Sudo for 30 Years Now Struggles to Fund the Work That Powers Millions of Servers
- How Close Are Quantum Computers to Breaking RSA-2048?
- Why Windows 10 Users Are Flocking to Zorin OS 18 Instead of Linux Mint?
- How to Prevent Ransomware Infection Risks?
- What is the best alternative to Microsoft Office?
Why iPhone Still Keeps Running Even Shutdown?
Security at risk? Researchers warn iPhones may remain vulnerable even when powered off.
Apple has long emphasized the iPhone’s robust security, famously refusing to unlock devices even at the request of the U.S. government.
But new research suggests a hidden risk: the iPhone may still be running in the background after shutdown—potentially creating an opportunity for malware.
Why Is EU Forcing Apple to Make iPhone Batteries User-Replaceable by 2027?
Why iPhones Keep Running After Shutdown
Modern iPhones don’t fully power off when users shut them down. Instead, a special Low Power Mode (LPM) keeps certain chips active. This enables useful features such as:
-
Find My iPhone tracking, even when the device is off or the battery is depleted.
-
Apple Wallet and car key functions, which can still be used without fully powering the phone.
This “always-on” design ensures convenience and safety for users—but it also introduces new attack surfaces.
iOS 27 Prioritizes Performance as Apple Pumps the Brakes on Features
The Security Gap
According to researchers at the Technical University of Darmstadt in Germany, the Bluetooth chip that powers these features lacks both a digital signature mechanism and firmware encryption. This means malicious firmware can be installed and executed without detection.
By exploiting this weakness, attackers could:
-
Track the phone’s location, even while it is powered off.
-
Run malicious code that persists in low-power mode.
-
Potentially infect the iPhone wirelessly, similar to certain Android vulnerabilities.
Since the LPM uses minimal power, such malware could run stealthily in the background without alerting the user. Detecting this kind of infection would require specialized tools and expertise—far beyond the reach of ordinary users.
Why Can’t Criminals “Ghost Tap” Your iPhone or Android Wallet?
Apple’s Response—or Lack of It
The research team noted that Apple engineers reviewed their paper before publication. However, Apple has not provided feedback or acknowledged the reported security issues.
A Double-Edged Sword
The LPM feature demonstrates the classic trade-off between functionality and security. While it allows iPhones to remain trackable and usable even when “off,” it also opens a potential backdoor.
John Loucaides, Senior VP of Policy at firmware security firm Eclypsium, commented:
“Hardware and software attacks like these have been proven feasible. This research is timely and practical. Every new feature adds value—but also introduces a new angle of attack.”
Lost iPhone “Found” Notification Scam: How to Avoid Falling for Fake Apple Alerts
Bottom Line
The findings don’t mean every iPhone is already compromised, but they highlight a critical risk: shutdown doesn’t always mean safe.
As manufacturers add more always-on features, ensuring airtight security for low-power components becomes just as important as protecting the main operating system.
