Apple’s Security Protects the Bad Guys

Apple’s iPhone may be the world’s most secure device. Apple designed the operating system and manages the apps it approves in such a way as to create what is widely described in the tech community as a walled garden.

Here’s the problem: Like all defensive walls, only the most sophisticated, most advanced enemy can get it. But once in, those walls make it equally challenging for defenders to root them out.

“It’s a double-edged sword,” Bill Marczak, a senior researcher at the cybersecurity watchdog Citizen Lab, tells MIT Technology Review. “You’re going to keep out a lot of the riffraff by making it harder to break iPhones. But the 1% of top hackers are going to find a way in and, once they’re inside, the impenetrable fortress of the iPhone protects them.”

He says that as Apple makes the iPhone ever more secure and difficult to hack, attackers aren’t just sitting back. They are developing ways to take over an iPhone invisibly.

“These allow attackers to burrow into the restricted parts of the phone without ever giving the target any indication of having been compromised. And once they’re that deep inside, the security becomes a barrier that keeps investigators from spotting or understanding nefarious behavior,” writes article author Patrick Howell O’Neill.

According to O’Neill, Apple’s security measures force defenders to look for indirect clues to the safety of a device. iVerify, one of the few Apple-approved security tools, looks for anomalies such as unexplained file modifications to detect breaches.

Now, the security Apple has designed into its iPhone ecosystem is spreading to other of the company’s products, notably the Mac.

Says security researcher Patrick Wardle, “Apple saw the benefits and has been moving them over to the Mac for a long time, and the (special) M1 chip is a huge step in that direction.”

Though Apple’s rules are intended to protect users’ privacy and prevent malicious intrusion, the article says hackers are “creating code that exists in a place where Apple doesn’t allow outside security tools to pry. It’s a game of hide-and-seek for those with the greatest skill and most resources.

‘Security tools are completely blind, and adversaries know this,’ Wardle says.”

O’Neill tells us there is no likely fix to the problem. Apple, he says, “Argues that no one has convincingly demonstrated that loosening security enforcement or making exceptions will ultimately serve the greater good.”

Photo by Tyler Lastovich on Unsplash

#WeAreGreenKey: Spotlight on Brad Martin
Architecture + Engineering General Interest

#WeAreGreenKey: Spotlight on Brad Martin

Green Key Unlocked: Mastering your Healthcare Interview
General Interest Healthcare

Green Key Unlocked: Mastering your Healthcare Interview

Is Covid-19 Back or Are We Just Seeing a Surge in Cases?
General Interest Healthcare Pharma

Is Covid-19 Back or Are We Just Seeing a Surge in Cases?

Strategic Networking: A Secret Weapon in Job Searching
Accounting + Finance Architecture + Engineering Financial Services General Interest Healthcare Human Resources Information Technology Legal Support Marketing Technology Pharma Professional Support

Strategic Networking: A Secret Weapon in Job Searching

#WeAreGreenKey: Spotlight on Justin Nadelman
General Interest Green Key News Information Technology Leadership + Management

#WeAreGreenKey: Spotlight on Justin Nadelman

Navigating the Tech Interview Maze: A Guide to Success
General Interest Information Technology

Navigating the Tech Interview Maze: A Guide to Success

Green Key Unlocked: How to Succeed in Payroll Management
Accounting + Finance General Interest Human Resources Leadership + Management

Green Key Unlocked: How to Succeed in Payroll Management

#WeAreGreenKey: Spotlight on Jenny Rehkugler
Accounting + Finance General Interest

#WeAreGreenKey: Spotlight on Jenny Rehkugler

Handling Mistakes & Failure in the Workplace
General Interest Worklife

Handling Mistakes & Failure in the Workplace

How to Support Those Affected by Hawai’i Wildfires 
Green Key News

How to Support Those Affected by Hawai’i Wildfires 

#WeAreGreenKey: Spotlight on Halle Sarfin
Green Key News Professional Support

#WeAreGreenKey: Spotlight on Halle Sarfin

Advantages of Offering Exit Interviews
General Interest Human Resources

Advantages of Offering Exit Interviews

Tracking Metrics: Learning & Development
General Interest Leadership + Management Worklife

Tracking Metrics: Learning & Development

#WeAreGreenKey: Spotlight on Leanna Gallagher
Green Key News Human Resources

#WeAreGreenKey: Spotlight on Leanna Gallagher

How to Beat the Summer Productivity Slump
General Interest Leadership + Management Worklife

How to Beat the Summer Productivity Slump

Questions to Ask When Hiring a Recruiter
General Interest Leadership + Management Worklife

Questions to Ask When Hiring a Recruiter

#WeAreGreenKey: Spotlight on Chianté Vidal
Architecture + Engineering Green Key News

#WeAreGreenKey: Spotlight on Chianté Vidal

Celebrating 10 Years of GKR in Rockville
Green Key News Leadership + Management Professional Support

Celebrating 10 Years of GKR in Rockville

Internal Mobility: Retaining Top Talent
General Interest

Internal Mobility: Retaining Top Talent

Green Key Unlocked: The Future of Telemedicine & Virtual Healthcare
General Interest Healthcare Information Technology

Green Key Unlocked: The Future of Telemedicine & Virtual Healthcare

Latest Blog Posts
View All Posts
#WeAreGreenKey: Spotlight on Brad Martin

#WeAreGreenKey: Spotlight on Brad Martin

What I find the most rewarding is the fulfilment of seeing someone take that next step in their career while...
Read More
Green Key Unlocked: Mastering your Healthcare Interview

Green Key Unlocked: Mastering your Healthcare Interview

Staying in the same vein as preparing for success in a tech interview, let’s take a look at how to...
Read More
Is Covid-19 Back or Are We Just Seeing a Surge in Cases?

Is Covid-19 Back or Are We Just Seeing a Surge in Cases?

With the recent increase in hospitalizations and Covid-19 cases across the U.S. the question of How to protect ourselves and...
Read More