Type 1+2+3 In Your iPhone Calculator, If It’s On iOS 11 It Won’t Give You The Correct Answer

Users on Twitter have been complaining about a bug in the Calculator app in iOS 11. Apparently, typing in 1+2+3= in the calculator too fast, results in it displaying the incorrect answer.

What’s actually happening here is that visual frills for the app are interfering with its efficiency. Basically, there’s a bit of lag in the animation when you type two or more numbers together, so it misses out some key presses. And the weird part is, this glitch has been around since iOS 11 was in beta testing.

Basically, the calculator ignores inputs here and there unless you’re typing slowly enough to account for your keypad lighting up. If a key is still highlighted, hitting another key will not do anything, it just won’t register.

A few users have also experience similar issues in older versions of iOS, but it’s much more noticeable in iOS 11, to the point where it can make the app almost unusable unless you’re typing agonisingly slow.

Apple seems to be aware of the issue, as one employee tweeted that more than 70 filed have filed a report pointing out the bug to the company.

Now it’s just a matter of waiting to see if all the attention forces apple to patch the issue sooner.

Don’t Miss

<!–

–>

  • <!–

    –>

    http://platform.twitter.com/widgets.js

    Erroneous Unicode character being displayed in Messages


     

    Some iPhone users running any flavor of iOS 11 are seeing a bug when they enter the letter I in an iMessage to another user. AppleInsider explains what’s going on, and how to work around it until the issue is solved by Apple.

    The problem isn’t widespread, but is clearly some form of bug that comes and goes in iOS 11.

    The symbol generated is a combination of the unicode symbol 0049 for the capital letter “i” as well as symbol FE0F which is called “variation selector-16.”

    Variation selectors are used to specify a specific variant for a Unicode character, such as the Japanese, Chinese, Korean, or Taiwanese form of a particular glyph. Why it is being erroneously inserted on some devices is not yet clear.

    There is some combination of devices that manifests the issue. In testing for this article, AppleInsider sent the message from a device with the problem to several different recipients.

    The symbol didn’t pop up on a 2016 or 2015 15-inch MacBook Pro running macOS 10.13.2 beta 1 and 10.13.1 respectively, and the correct symbol was displayed when the message was sent to one iPhone SE to another iPhone SE running iOS 11.1 and an iPhone 7 Plus running the iOS 11.2 beta. However, a 2012 Mac mini running macOS 10.13.1 did see it, as illustrated above.

    AppleInsider has reached out to Apple regarding the issue, and has not received a response as of yet. A quick fix is to turn off predictive text, or to force the afflicted device to autocorrect “i” to “I” which will prevent the variation selector Unicode symbol from being applied.

    Users also suggest a phone restore might clean up the problem —but the Apple Community Support Forums suggest that this isn’t a permanent fix.

    Researchers hack iOS 11 at Mobile Pwn2Own 2017

    Security researchers competing at Mobile Pwn2Own 2017 were able to hack various smartphones, including Apple’s brand new iOS 11.1 software.

    Apple released iOS 11.1 on Halloween and the operating system was hacked multiple times at Zero Day Initiative’s (ZDI) Mobile Pwn2Own on Nov. 1 and 2. Tencent Keen Security Lab did the most damage at the competition with two successful hacks of iOS 11 running on an iPhone 7.

    On day one of Mobile Pwn2Own, the Keen Lab team was able to successfully load a rogue application and have it persist through a reboot with a WiFi exploit that used a total of four different vulnerabilities to execute. It is unknown what bugs were used, but Apple had previously confirmed the recently disclosed KRACK WiFi flaw was patched in iOS 11.1, so this would have been a different WiFi issue.

    However, one of the bugs used by Keen Lab on day one was also used by Qihoo 360 Security, of China, in a WiFi hack on iOS 11.1 on day two. Dustin Childs, in charge of ZDI communications for Trend Micro, said this was a surprising event.

    “After a successful demonstration, things got a bit murky in the disclosure room. 360 Security used three separate bugs to exploit WiFi on the iPhone, but one of the bugs was submitted in a previous attempt in the contest by a different competitor,” Childs wrote in a blog post. “While the intrigue of a bug collision is certainly interesting, let’s not overlook the fact that 360 Security demonstrated an exploit that exfiltrated data from an iPhone just by connecting it to a WiFi network.”

    On day one, Keen Lab also separately hacked iOS 11 by exploiting a Safari browser bug and a system service flaw in order to get its rogue application to persist through a reboot. For its efforts at Mobile Pwn2Own, Keen Lab earned a total of $155,000.

    Richard Zhu, security researcher also known as fluorescence, successfully exploited a Safari browser flaw and another bug to escape the iOS sandbox and execute code, earning $25,000.

    Mobile Pwn2Own 2017 roundup

    Itzhak “Zuk” Avraham, founder of Zimperium, Inc., said on Twitter it’s important for users to realize even new and updated phones are at risk.

    “If mobile pwn2own this year tells us one thing: phones are totally insecure. Not even speaking about old/outdated phones. This is the golden age for offensive security companies. If you care about your data, prepare accordingly,” Avraham wrote on Twitter. “If multiple groups were able to hack so many different models remotely, including multiple baseband submissions, we, as users, are in trouble. Unfortunately, this is totally aligned with what I’m personally seeing in the wild.”

    In total, day one of Mobile Pwn2Own 2017 had five successful hack attempts across various devices and two failed attempts, while day two had six more attempts which were all successful.

    ZDI said Mobile Pwn2Own 2017 was its largest mobile contest ever with a total of 32 unique bugs submitted. The 11 successful attacks came against the Samsung Galaxy S8, Huawei Mate9 Pro and Apple iPhone 7.

    Lukas Stefanko, malware researcher at ESET, noted one major smartphone was not hacked during the competition.

    http://platform.twitter.com/widgets.js