osmanfromislamabad wrote:
really? never heard of that before. i tried searching online too but didn’t find any similar cases. if what you are saying is true, that means it’s not really a security feature.
Face ID biometrics are a shortcut means to avoid entering the passcode as often, and which allows longer and more complex passcodes be used.
Device security and data encryption is based on the passcode.
Not on Face ID.
Face ID is not a replacement for the passcode.
You have to know the passcode to even enable Face ID too, such as when an iPhone reboots, or at various other times.
Face ID can’t decrypt and can’t access the iPhone data. The passcode can. Once the passcode is entered, the access granted by the passcode is cached in a secure enclave location within iPhone and that cache then allows more of a user’s data to be accessible, and Face ID can then re-allow access to the device and its data using the cached permission.
After a reboot, the cache is gone and data is re-secured, and the passcode must be re-entered.
In Apple technical jargon (might want to skip the rest here!), this first state after rebooting an iPhone is called Before First Unlock (BFU). Once the iPhone is first unlocked with its passcode after a reboot, the iPhone is in After First Unlock (AFU).
Getting from BFU to AFU requires the passcode.
Once in AFU, Face ID will work, wireless networks and some other details will work, and more of the user’s data is accessible.
Getting from AFU back to BFU usually means a reboot, and the current iOS version will automatically reboot (and revert into BFU) when the iPhone is inactive for three days.