Wireless chips, including Bluetooth, run using low power mode when the power is off.

Malicious actors can take advantage of the reduced power mode to use malware.

“Services such as FindMy need to work even when the devices are shut off.

Someone working at a desk, holding a cellphone that displays a lock on the screen, while logging into a laptop.

d3sign / Getty Images

This requires a processor to continue running.”

Thus, it has a long-lasting effect on the overall iOS security model.

Kolodenker explained that modern mobile devices consist of many different computer processors.

“These are what runs most of the operating system and call capability,” he added.

These processors can be exploited much like the AP and BP."

Don’t worry too much about threats when your phone is powered off, though.

“The problem is that most people will never use one,” he added.

“They are encumbering because they don’t allow your phone access to communication.

I use one only for travel, but I’ll be using it more often now.”