{"id":983,"date":"2009-07-21T15:07:38","date_gmt":"2009-07-21T14:07:38","guid":{"rendered":"http:\/\/blog.intego.com\/?p=983"},"modified":"2012-12-12T13:49:04","modified_gmt":"2012-12-12T21:49:04","slug":"tidbits-looks-at-iphone-3gs-security-features","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/","title":{"rendered":"TidBITs Looks at iPhone 3GS Security Features"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"><\/p>\n<p>An <a href=\"http:\/\/db.tidbits.com\/article\/10416\">article in TidBITs<\/a> takes a look at the security features in the iPhone 3GS. According to the author, Rich Mogull, the new version of Apple&#8217;s top-selling phone has a number of advantages that make it more secure than before:<\/p>\n<ul>\n<li>A hardware encryption chip. All data on the phone is encrypted by default using an AES 256 chip, as opposed to software encryption. This allows you to wipe your phone if you lose it or if it&#8217;s stolen, and protects against data access when you&#8217;re not logged in. However, Mogull says, &#8220;This doesn&#8217;t protect you from all attacks. As with any other encrypted computer, if the bad guy hacks the device while you are logged in, he can still access your unencrypted data.&#8221;<\/li>\n<li>Passcode locking. &#8220;On any iPhone, you can choose the amount of time your phone sits idle before it requires the passcode again.&#8221; This ensures that your iPhone is locked when you&#8217;re not using it. &#8220;One additional feature sets the passcode lock on the iPhone apart from many other phones on the market. If you select the option to &#8220;Erase Data,&#8221; the iPhone allows just 10 failed attempts at entry.&#8221; Mogull says this feature is not seen on other consumer cellphones.<\/li>\n<li>Remote wipe. As mentioned above, you can remotely wipe your phone when it&#8217;s lost or stolen. &#8220;Remote Wipe on the iPhone 3GS works just like a passcode wipe; the encryption key is deleted, making it a fast and effective process.&#8221; <\/li>\n<\/ul>\n<p>Mogull goes on to mention other reasons why the iPhone is as &#8220;secure as can reasonably be&#8221;, but points out that, &#8220;the iPhone has experienced many software vulnerabilities, some of which could allow an attacker to take control of your phone by having you visit a malicious Web page. One security researcher recently discovered a way to hack iPhones remotely with little more than SMS text messages.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An article in TidBITs takes a look at the security features in the iPhone 3GS. According to the author, Rich Mogull, the new version of Apple&#8217;s top-selling phone has a number of advantages that make it more secure than before: A hardware encryption chip. All data on the phone is encrypted by default using an [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"An article in TidBITs takes a look at the security features in the iPhone 3GS. According to the author, Rich Mogull, the new version of Apple&#039;s\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TidBITs Looks at iPhone 3GS Security Features  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"An article in TidBITs takes a look at the security features in the iPhone 3GS. According to the author, Rich Mogull, the new version of Apple&#039;s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-07-21T14:07:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:49:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/\",\"name\":\"TidBITs Looks at iPhone 3GS Security Features - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#primaryimage\"},\"datePublished\":\"2009-07-21T14:07:38+00:00\",\"dateModified\":\"2012-12-12T21:49:04+00:00\",\"description\":\"An article in TidBITs takes a look at the security features in the iPhone 3GS. According to the author, Rich Mogull, the new version of Apple's\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TidBITs Looks at iPhone 3GS Security Features\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"TidBITs Looks at iPhone 3GS Security Features\",\"datePublished\":\"2009-07-21T14:07:38+00:00\",\"dateModified\":\"2012-12-12T21:49:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#webpage\"},\"wordCount\":315,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"An article in TidBITs takes a look at the security features in the iPhone 3GS. According to the author, Rich Mogull, the new version of Apple's","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/","og_locale":"en_US","og_type":"article","og_title":"TidBITs Looks at iPhone 3GS Security Features  - The Mac Security Blog","og_description":"An article in TidBITs takes a look at the security features in the iPhone 3GS. According to the author, Rich Mogull, the new version of Apple's","og_url":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-07-21T14:07:38+00:00","article_modified_time":"2012-12-12T21:49:04+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/","name":"TidBITs Looks at iPhone 3GS Security Features - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#primaryimage"},"datePublished":"2009-07-21T14:07:38+00:00","dateModified":"2012-12-12T21:49:04+00:00","description":"An article in TidBITs takes a look at the security features in the iPhone 3GS. According to the author, Rich Mogull, the new version of Apple's","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"TidBITs Looks at iPhone 3GS Security Features"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"TidBITs Looks at iPhone 3GS Security Features","datePublished":"2009-07-21T14:07:38+00:00","dateModified":"2012-12-12T21:49:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#webpage"},"wordCount":315,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tidbits-looks-at-iphone-3gs-security-features\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fR","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/983"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=983"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/983\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}