• shortwavesurfer@lemmy.zip
        link
        fedilink
        English
        arrow-up
        27
        ·
        1 month ago

        Just set the time too longer than you would be asleep. So in this screenshot above you could set it to 18 hours and most people at least that I know do not go 18 hours without unlocking their phone at least one time which would then reset the timer.

          • HEXN3T@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 month ago

            The only solution would be to simply turn the setting off at night, or have developers add an automatic scheduling option. Of course, you can just set the timer to be longer than your sleep schedule as well, but then you miss out on security.

            • bobs_monkey@lemm.ee
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 month ago

              Iirc phone calls and alarms still work after a reboot in the lock status, it just disables biometric unlock and keeps the filesystem encrypted

              • HEXN3T@lemmy.blahaj.zone
                link
                fedilink
                English
                arrow-up
                1
                ·
                1 month ago

                Well, funny thing–I was once late for a job because my alarm didn’t go off. Guess why? Yep, auto reboot. There was even a notification saying the alarm didn’t go off. Very odd behaviour, but that’s what happened.

      • stoly@lemmy.world
        link
        fedilink
        English
        arrow-up
        27
        ·
        1 month ago

        When you input your password, then your biometrics (faceID, fingerprint, etc) become active. A restart requires you to enter that again. The police can make you put your finger on your phone or look at it, but they can’t make you divulge your password without a court order.

        • AlternateRoute
          link
          fedilink
          English
          arrow-up
          22
          arrow-down
          1
          ·
          1 month ago

          There are have also been some exploits that are possible ONLY while the machine is booted and already in that state unlocked state, rebooting relocks all the HW encryption and clears main memory.

      • pHr34kY@lemmy.world
        link
        fedilink
        English
        arrow-up
        22
        ·
        1 month ago

        Law enforcement have tools to bypass lockscreens and access the data on the device. They use backdoors and exploits, so older phones are more vulnerable. Most exploits only work if the phone has been unlocked at some point since it was booted.

        This is why law enforcement keep them powered-on, and in a faraday cage. They are in a state with a better chance of unlock, but have no signal so nobody can remotely find/lock/wipe it.