Apple’s Security Protects the Bad Guys

Apple’s iPhone may be the world’s most secure device. Apple designed the operating system and manages the apps it approves in such a way as to create what is widely described in the tech community as a walled garden.

Here’s the problem: Like all defensive walls, only the most sophisticated, most advanced enemy can get it. But once in, those walls make it equally challenging for defenders to root them out.

“It’s a double-edged sword,” Bill Marczak, a senior researcher at the cybersecurity watchdog Citizen Lab, tells MIT Technology Review. “You’re going to keep out a lot of the riffraff by making it harder to break iPhones. But the 1% of top hackers are going to find a way in and, once they’re inside, the impenetrable fortress of the iPhone protects them.”

He says that as Apple makes the iPhone ever more secure and difficult to hack, attackers aren’t just sitting back. They are developing ways to take over an iPhone invisibly.

“These allow attackers to burrow into the restricted parts of the phone without ever giving the target any indication of having been compromised. And once they’re that deep inside, the security becomes a barrier that keeps investigators from spotting or understanding nefarious behavior,” writes article author Patrick Howell O’Neill.

According to O’Neill, Apple’s security measures force defenders to look for indirect clues to the safety of a device. iVerify, one of the few Apple-approved security tools, looks for anomalies such as unexplained file modifications to detect breaches.

Now, the security Apple has designed into its iPhone ecosystem is spreading to other of the company’s products, notably the Mac.

Says security researcher Patrick Wardle, “Apple saw the benefits and has been moving them over to the Mac for a long time, and the (special) M1 chip is a huge step in that direction.”

Though Apple’s rules are intended to protect users’ privacy and prevent malicious intrusion, the article says hackers are “creating code that exists in a place where Apple doesn’t allow outside security tools to pry. It’s a game of hide-and-seek for those with the greatest skill and most resources.

‘Security tools are completely blind, and adversaries know this,’ Wardle says.”

O’Neill tells us there is no likely fix to the problem. Apple, he says, “Argues that no one has convincingly demonstrated that loosening security enforcement or making exceptions will ultimately serve the greater good.”

Photo by Tyler Lastovich on Unsplash

March Jobs Report: Unexpected Strength
General Interest

March Jobs Report: Unexpected Strength

#WeAreGreenKey: Spotlight on Lucas Leitenberger
Architecture + Engineering

#WeAreGreenKey: Spotlight on Lucas Leitenberger

Biotech vs. Techbio: A Nexus of Biology and Tech
General Interest

Biotech vs. Techbio: A Nexus of Biology and Tech

Cancer Vaccines: A New Hope
General Interest

Cancer Vaccines: A New Hope

Navigating Quarterly Reviews with Confidence
General Interest

Navigating Quarterly Reviews with Confidence

#WeAreGreenKey: Spotlight on Meryl Schoen
General Interest Professional Support

#WeAreGreenKey: Spotlight on Meryl Schoen

Mastering Hiring Algorithms as a Candidate
General Interest

Mastering Hiring Algorithms as a Candidate

Tips for Creating Effective Corporate Videos for Social Media
General Interest

Tips for Creating Effective Corporate Videos for Social Media

The Power of Video on Corporate Social Media
General Interest

The Power of Video on Corporate Social Media

#WeAreGreenKey: Spotlight on Antonia Piazza
General Interest

#WeAreGreenKey: Spotlight on Antonia Piazza

Strategies for Equitable Employee Development
General Interest

Strategies for Equitable Employee Development

Anthropic Unveils Claude 3: Redefining AI Chatbots with Enhanced Capabilities
Information Technology

Anthropic Unveils Claude 3: Redefining AI Chatbots with Enhanced Capabilities

#WeAreGreenKey: Spotlight on Mike Bosco
Accounting + Finance General Interest

#WeAreGreenKey: Spotlight on Mike Bosco

Marketing Strategies: 2024 Trends and Strategies for Success
General Interest

Marketing Strategies: 2024 Trends and Strategies for Success

The Essence of Marketing Strategy: Driving Business Success (Part II)
General Interest

The Essence of Marketing Strategy: Driving Business Success (Part II)

The Essence of Marketing Strategy: Driving Business Success
General Interest

The Essence of Marketing Strategy: Driving Business Success

Mastering Task Prioritization for Stress Reduction
General Interest

Mastering Task Prioritization for Stress Reduction

Crafting the Future: Delving into AI as a College Major
General Interest Information Technology

Crafting the Future: Delving into AI as a College Major

Mary-Kate Bula Selected as Assistant Coach of the USA Women’s Flag Football National Team
General Interest Pharma

Mary-Kate Bula Selected as Assistant Coach of the USA Women’s Flag Football National Team

Leveraging LinkedIn Polls: A Strategic Tool for Business Insights
General Interest

Leveraging LinkedIn Polls: A Strategic Tool for Business Insights

Latest Blog Posts
View All Posts
March Jobs Report: Unexpected Strength

March Jobs Report: Unexpected Strength

Despite economists’ forecasts of a slowdown in job growth and a weakening labor market due to 11 anticipated interest rate...
Read More
#WeAreGreenKey: Spotlight on Lucas Leitenberger

#WeAreGreenKey: Spotlight on Lucas Leitenberger

Welcome back to #WeAreGreenKey, where we shine a spotlight on our powerhouse recruiting team.  We recently met up with Lucas...
Read More
Biotech vs. Techbio: A Nexus of Biology and Tech

Biotech vs. Techbio: A Nexus of Biology and Tech

In the dynamic world of scientific innovation, two terms have emerged as guiding lights: Biotech and Techbio. These terms encapsulate...
Read More