2/12/2026 at 3:58:12 PM
So the exploiters have deprecated that version of spyware and moved on I see. This has been the case every other time. The state actors realize that there's too many fingers in the pie (every other nation has caught on), the exploit is leaked and patched. Meanwhile, all actors have moved on to something even better.Remember when Apple touted the security platform all-up and a short-time later we learned that an adversary could SMS you and pwn your phone without so much as a link to be clicked.
KSIMET: 2020, FORCEDENTRY: 2021, PWNYOURHOME, FINDMYPWN: 2022, BLASTPASS: 2023
Each time NSO had the next chain ready prior to patch.
I recall working at a lab a decade ago where we were touting full end-to-end exploit chain on the same day that the target product was announcing full end-to-end encryption -- that we could bypass with a click.
It's worth doing (Apple patching) but a reminder that you are never safe from a determined adversary.
by dudeinhawaii
2/12/2026 at 4:13:00 PM
How much do you think Lockdown Mode + MIE/eMTE helps? Do you believe state actors work with manufacturers to find/introduce new attack vectors?by whitepoplar
2/12/2026 at 4:20:31 PM
My iOS devices have been repeatedly breached over the last few years, even with Lockdown mode and restrictive (no iCloud, Siri, Facetime, AirDrop ) MDM policy via Apple Configurator. Since moving to 2025 iPad Pro with MIE/eMTE and Apple (not Broadcom & Qualcomm) radio basebands, it has been relatively peaceful. Until the last couple of weeks, maybe due to leakage of this zero day and PoC as iOS 26.3 was being tested.by walterbell
2/12/2026 at 4:26:56 PM
Are you a person of high interest? I was under the impression that these sorts of breaches only happen to journalists, state officials, etc.by whitepoplar
2/12/2026 at 4:30:25 PM
Who knows? Does HN count as journalism :)I would happily pay Apple an annual subscription fee to run iOS N-1 with backported security fixes from iOS N, along with the ability to restore local data backups to supervised devices (which currently requires at least 2 devices, one for golden image capture and one for restore, i.e. "enterprise" use case). I accept that Apple devices will be compromised (keep valuable data elsewhere), but I want fast detection and restore for availability.
GrapheneOS on Pixel and Pixel Tablet have been anomaly free, but Android tablet usability is << Apple iPad Pro.
USB with custom Debian Live ISO booted into RAM is useful for generic terminal or web browsing.
by walterbell
2/12/2026 at 7:34:35 PM
could you please elaborate on how you determine that your devices have been breached? e.g. referring to "anomaly free" makes it sound like you might witnessing non-security related unexpected behaviour? sorry for the doubt, i'm curiousby throawayonthe
2/13/2026 at 2:24:53 AM
Explained at length below: after subjective indicator of possible breach, by monitoring, allowlisting and then deleting outbound network traffic sources (i.e. apps) on the device, then look closely at any remaining, non-allowlisted traffic, which should be zero.apps: https://news.ycombinator.com/item?id=46993016 | https://news.ycombinator.com/item?id=46997970
by walterbell
2/12/2026 at 6:19:50 PM
First idea if great honestly - lots of vendors do this. I use Firefox long term stable and Chrome offers this for enterprise customers. Windows even offers multiple options of this (LTSC being the best by far).Would also make a great corporate / government product - I doubt they care about charging the average consumer for such a subscription (not enough revenue) but I can see risk averse businesses and especially government sectors being interested.
by Melatonic
2/12/2026 at 7:07:48 PM
You can already do that?Apple offers that to all customers who open up an enterprise account and direct billing line.
by MichaelZuo
2/12/2026 at 7:37:34 PM
You can already do that?
Apple offers that to all customers who open up an enterprise account and direct billing line
What's the name of the feature for Apple Enterprise customers that would allow iOS 18 to be installed on a newly provisioned device today?Downgrades are not supported by Apple Business Manager MDM and there's no reference to downgrades on the Enterprise page, https://www.apple.com/business/enterprise/
by walterbell
2/13/2026 at 3:13:11 AM
By definition you will have access to things Apple wont publish or support at subsidized rates below the fully loaded hourly cost of a senior engineer.Because you will be paying the full unsubsidized rate for any support needed for features not available to the mass market.
Its like how IBM will gladly send a team of senior engineers to help enterprise clients resolve every last possible request.
Edit: As compared to mass market features, where the economics dont work unless they’re close to 100% certain most users wont require any costly support.
by MichaelZuo
2/13/2026 at 3:38:32 AM
Would the following be possible, in principle? - Signup for Apple Enterprise account with direct billing
- Buy one hardware device direct via Enterprise account
- Buy one MDM license for the hardware device
- Sign contract for support at $500/hr, no minimum commitment
- Get access to docs & tools for iOS 18 on new hardware (don't need support)
Apple Enterprise Developer account requires 100 employees minimum, but Apple Enterprise does not.
by walterbell
2/13/2026 at 1:04:21 AM
Just to save everyone the read, reading through the replies, this person is very clearly paranoid and has no clear evidence of an actual breach. I have zero idea why people are actually engaging with this.by UqWBcuFx6NV4r
2/13/2026 at 2:07:12 AM
This thread (on a story about 10 year old 0-day that exposed 2 billion devices to potential breach!) has many comments questioning the mere possibility of repeated breach, yet not a single comment engaging the point of my original post -- that Apple's 2025 introduction of MIE/eMTE changed the observable device behavior vs. Apple devices of the previous five years. On the new iPad Pro, MIE was shipped alongside Apple's $1B investment in modem technology to replace Qualcomm cellular and Broadcom WiFi/BT radios used on billions of existing devices."Memory Integrity Enforcement" (2025), 250 comments, https://news.ycombinator.com/item?id=45186265
Memory Integrity Enforcement (MIE) is the culmination of an unprecedented design and engineering effort, spanning half a decade, that combines the unique strengths of Apple silicon hardware with our advanced operating system security to provide industry-first, always-on memory safety protection across our devices — without compromising our best-in-class device performance. We believe Memory Integrity Enforcement represents the most significant upgrade to memory safety in the history of consumer operating systems.
> has no clear evidence of an actual breachIf the perceived breaches during 5 years of using multiple generations of Apple devices were due to methodology errors leading to false positives, why did they stop after moving to 2025 Apple hardware with MIE and Apple-only radio basebands?
by walterbell
2/12/2026 at 4:27:40 PM
How can you tell that you were breached?by drakenot
2/12/2026 at 4:28:30 PM
Presence of one or more: unexpected outbound traffic observed via Ethernet, increased battery consumption, interactive response glitching, display anomalies ... and their absence after hard reset key sequence to evict non-persistent malware. Then log review.by walterbell
2/12/2026 at 5:22:21 PM
What are examples of logs that you're considering IOCs? The picture you are painting is basically that most everyone is already compromised most of the time, which is ... hard to swallow.by amazingman
2/12/2026 at 5:39:04 PM
I reported the experience on my devices, which said nothing about "everyone".by walterbell
2/12/2026 at 4:38:27 PM
How did you link that traffic to malicious activity?by acdha
2/12/2026 at 4:44:16 PM
By minimizing apps on device, blocking all traffic to Apple 17.x, using Charles Proxy (and NetGuard on Android) to allowlist IP/port for the remaining apps at the router level, and then manually inspecting all other network activity from the device. Also the disappearance of said traffic after hard-reset.Sometimes there were anomalies in app logs (iOS Settings - Analytics) or sysdiagnose logs. Sadly iOS 26 started deleting logs that have been used in the past to look for IOCs.
by walterbell
2/12/2026 at 7:54:00 PM
How did you determine that a connection was malicious? Modern apps are noisy with all of the telemetry and ad traffic, and that includes a fair amount of background activity. If all you’re seeing are connections to AWS, GCP, etc. it’s highly unlikely that it’s a compromise.Similarly, when you talk about it going away after a reset that seems more like normal app activity stopping until you restart the app.
by acdha
2/13/2026 at 3:40:58 AM
Summary: https://news.ycombinator.com/item?id=46998191by walterbell
2/12/2026 at 6:22:00 PM
Are you sure whatever you have configured in the MDM profile or one of these apps like Charles Proxy is not the source of the traffic?Are you using a simple config profile on iOS to redirect DNS and if so how are you generating it ? Full MDM or what are you adding to the profile ?
by Melatonic
2/12/2026 at 6:35:46 PM
Traffic was monitored on a physical ethernet cable via USB ethernet adapter to iOS device.Charles Proxy was only used to time-associate manual application launch with attempts to reach destination hostnames and ports, to allowlist those on the separate physical router. If there was an open question about an app being a potential source of unexpected packets, the app was offloaded (data stayed on device, but app cannot be started).
MDM was not used to redirect DNS, only toggling features off in Apple Configurator.
by walterbell
2/13/2026 at 2:31:19 AM
Surely you used several USB Ethernet adapters to rule them out as being the source as well right? Those types of dongles are well known for calling home.by universenz
2/13/2026 at 3:42:11 AM
Good observation :) Multiple ethernet adapters: Apple original (ancient USB2 10/100), Tier 1 PC OEM, plus a few random ones. Some USB adapters emit more RF than others.by walterbell
2/13/2026 at 4:32:32 AM
And your sure it wasn't some built in Apple service ? I believe they host a ton on GCPby Melatonic
2/13/2026 at 5:55:51 AM
It excluded the published hostnames for services and CDNs (some of which resolved to GCP, Akamai, etc) published by Apple for sysadmins of enterprise networks, https://news.ycombinator.com/item?id=46994394. It's indeed possible that one of the unknown destination IPs could have been an undocumented Apple service, but some (e.g. OVH) seem unlikely.by walterbell
2/12/2026 at 4:36:18 PM
To where?by nickburns
2/12/2026 at 4:52:39 PM
Usually a generic cloud provider, not unique, identifying or stable.by walterbell
2/12/2026 at 5:51:51 PM
So how did you identify this as a breach? I'm struggling to find this credible, and you've yet to provide specifics.Right now it comes across as "just enough knowledge to be dangerous"-levels, meaning: you've seen things, don't understand those things, and draw an unfounded conclusion.
Feel free to provide specifics, like log entry lines, that show this breach.
by Someone1234
2/12/2026 at 5:54:33 PM
Please feel free to ignore this sub-thread. I'm merely happy that Apple finally shipped an iPad that would last (for me! no claims about anyone else!) more than a few weeks without falling over.To learn iOS forensics, try Corellium iPhone emulated VMs that are available to security researchers, the open-source QEMU emulation of iPhone 11 [1] where iOS behavior can be observed directly, paid training [2] on iOS forensics, or enter keywords from that course outline into web search/LLM for a crash course.
[1] https://news.ycombinator.com/item?id=44258670
[2] https://ringzer0.training/countermeasure25-apple-ios-forensi...
by walterbell
2/12/2026 at 8:00:36 PM
I worked at Corellium tracking sophisticated threats. Nothing you’ve posted is indicative of a compromise. If you’re convinced I’d be happy to go through your IOCs and try to explain them to you.by saagarjha
2/12/2026 at 8:56:27 PM
Thanks. In this thread, I was trying to share a positive story about the recent iPad Pro _NOT_ exhibiting the many issues I observed over 5 years and multiple generations of iPhones and iPad Pros. If any new issues surface, I'll archive immutable logs for others to review.by walterbell
2/12/2026 at 6:11:00 PM
I think this just further highlights my credibility point.by Someone1234
2/12/2026 at 6:25:10 PM
With the link I provided, a hacker can use iOS emulated in QEMU for: • Restore / Boot
• Software rendering
• Kernel and userspace debugging
• Pairing with the host
• Serial / SSH access
• Multitouch
• Network
• Install and run any arbitrary IPA
Unlike a locked-down physical Apple device. It's a good starting point.
by walterbell
2/12/2026 at 6:55:56 PM
I'm much more convinced that you're competent in the field of forensics. But I still don't think suspicious network traffic can be categorically defined as a 'device breach.'For all you know, the traffic you've observed and deem malicious could just as well have been destined for Apple servers.
by nickburns
2/12/2026 at 8:08:31 PM
Apple traffic goes to 17.0.0.0/8 + CDNs aliased to .apple.com, which my egress router blocks except for Apple-documented endpoints for notifications and software update, https://support.apple.com/en-us/101555appldnld.apple.com configuration.apple.com gdmf.apple.com gg.apple.com gs.apple.com ig.apple.com mesu.apple.com mesu.apple.com ns.itunes.apple.com oscdn.apple.com osrecovery.apple.com skl.apple.com swcdn.apple.com swdist.apple.com swdownload.apple.com swscan.apple.com updates.cdn-apple.com updates-http.cdn-apple.com xp.apple.com
There was no overlap between unexpected traffic and Apple CDN vendors.
by walterbell
2/12/2026 at 8:17:10 PM
'Apple-documented' being operative here.by nickburns
2/12/2026 at 8:36:49 PM
True, perhaps OVH in Germany (one anomaly example) is an Apple vendor. No way to know.by walterbell
2/12/2026 at 7:51:39 PM
They said upthread that they had blocked 17.0.0.0/8 ("Apple"), but maybe there are teams inside Apple that are somehow operating services outside of Apple's /8 in the name of Velocity? I kind of doubt it, though, because they don't seem like the kind of company that would allow for that kind of cowboying.by philsnow
2/12/2026 at 7:55:02 PM
I don't doubt it in the slightest. Every corporate surveillance firm—I mean, third-party CDN in existence ostensibly operates in the name of 'velocity'.by nickburns
2/12/2026 at 7:59:08 PM
Apple has used AWS and Cloudflare in the past, too, so it’s not like seeing that traffic is a reliable indicator of compromise.by acdha
2/12/2026 at 4:48:27 PM
LOL. Aren't you a little paranoid?by meindnoch
2/12/2026 at 5:22:23 PM
Just trying to use expensive tablets in peace. Eventually stopped buying new models due to breaches.After a few years, bought the 2025 iPad Pro to see if MTE/eMTE would help, and it did.
by walterbell
2/12/2026 at 7:53:44 PM
There’s no hard evidence that you’ve put forward that you’ve been breached.Not understanding every bit of traffic from your device with hundreds of services and dozens of apps running is not evidence of a breach.
Have you found unsigned/unauthorized software? Have you traced traffic to a known malware collection endpoint? Have you recovered artifacts from malware?
Strong claims require strong evidence imo and this isn’t it.
by radicaldreamer
2/13/2026 at 1:52:49 AM
As mentioned elsewhere in this thread, traffic from each iOS app was traced via Charles Proxy, the endpoints allowlisted for normal behavior, and finally the app was offloaded so it could not generate any traffic from the device. Over time, this provided a baseline of known outbound traffic from the device, e.g. after provisioning a new device with a small number of trusted apps.Apple traffic was isolated separately, https://news.ycombinator.com/item?id=46994394
Traffic outside that baseline could then be reviewed closely.
by walterbell
2/12/2026 at 7:30:47 PM
Lol 'breaches'.I agree with other posters that you seem to be capable of network level forensics, but you have said nothing to back up what you consider a device breach other than 'some cloud destined network traffic which disapears after a hard reset'.
In my experience of forensic reports, this link is tenuous at best and would not be considered evidence or even suspected breach based on that alone.
by alt227
2/12/2026 at 5:04:22 PM
[flagged]by avazhi
2/12/2026 at 6:16:23 PM
I don't think that proves they've been breached. Are you sure your not just seeing keep alive traffic or something random you haven't taken into account ?by Melatonic
2/13/2026 at 3:51:07 AM
Much time was taken to separate known from unknown traffic, https://news.ycombinator.com/item?id=46998191by walterbell
2/12/2026 at 7:00:59 PM
Sounds like it is time to drop Apple devices and move to Graphene.by drnick1
2/12/2026 at 8:17:34 PM
From another comment - I switched phone to Pixel and it has worked well, with a separate profile for apps that require Google Play Services.> GrapheneOS on Pixel and Pixel Tablet have been anomaly free, but Android tablet usability is << Apple iPad Pro.
iPad Pro with Magic Keyboard and 4:3 screen is an engineering marvel. The UX overhead of Pixel Tablet and inconsistency of Android apps made workflows slow or even impractical, so I eventually went back to iPad and accepted the cost/pain of re-imaging periodically, plus having a hot-spare device,
by walterbell
2/12/2026 at 10:50:45 PM
Graphene does not use the Pixel UI by default, it's very barebones. IMO, it's much better than the bloated Google UI.by drnick1
2/12/2026 at 5:31:41 PM
> restrictive (no iCloud, Siri, Facetime, AirDrop ) MDM policy via Apple ConfiguratorMDM? That doesn't surprise me. Do you want to know how _utterly_ trivial MDM is to bypass on Apple Silicon? This is the way I've done it multiple times (and I suspect there are others):
Monterey USB installer (or Configurator + IPSW)
Begin installation.
At the point of the reboot mid-installation, remove Internet access, or, more specifically, make sure the Mac cannot DNS resolve: iprofiles.apple.com, mdmenrollment.apple.com, deviceenrollment.apple.com.
Continue installation and complete.
Add 0.0.0.0 entries for these three hostnames to /etc/hosts (or just keep the above "null routed" at your DNS server/router.
Tada. That's it. I wish there was more to it.
You can now upgrade your Mac all the way to Tahoe 26.3 without complaint, problem, or it ever phoning home. Everything works. iCloud. Find My. It seems that the MDM enrollment check is only ever done at one point during install and then forgotten about.
Caveat: I didn't experiment too much, but it seems that some newer versions of macOS require some internet access to complete installation, for this reason or others, but I didn't even bother to validate, since I had a repeatable and tested solution.
by FireBeyond
2/12/2026 at 6:23:42 PM
Do most people even use MDM on laptops or desktops ? I see it mostly used on phonesby Melatonic
2/13/2026 at 3:52:33 AM
Corporate laptops? https://business.apple.com/by walterbell
2/12/2026 at 5:42:10 PM
Useful, thanks for the contribution to HN/LLM knowledge base!by walterbell
2/12/2026 at 4:57:55 PM
It appears the iPhone Air and iPhone 16e are the only devices with the Apple radio basebands so far.by j45
2/12/2026 at 5:06:12 PM
16e still uses a Broadcom chip for WiFi + Bluetooth, though. iPhone Air is currently the only iPhone that uses both Apple-designed baseband + WiFi/BT chips.by whitepoplar
2/12/2026 at 5:37:51 PM
Appreciate the clarification.by j45
2/12/2026 at 4:59:07 PM
+ iPad Pro.by walterbell
2/12/2026 at 5:57:30 PM
> Do you believe state actors work with manufacturers to find/introduce new attack vectors?Guaranteed. I find it hard to believe state actors will not attempt this.
Flash paper is king when it comes to secrets I guess.
by 8cvor6j844qw_d6
2/12/2026 at 8:02:18 PM
They might but it’s currently easier to just find exploits.by saagarjha
2/12/2026 at 4:09:34 PM
Thanks for contributing to our increasing lack of security and anonymity.by mmmlinux
2/12/2026 at 5:06:59 PM
Meh. It’s up to Apple to write secure software in the first place. Maybe if they spent more time on that instead of fucking over their UI in the name of something different, and less time virtue signalling, their shit would be more secure.by avazhi
2/12/2026 at 7:36:33 PM
Yes because other operating systems never have a decade old vulnerability?https://www.sysdig.com/blog/detecting-cve-2024-1086-the-deca...
And yes because their UI folks should be spending time on the kernel. What next? If Apple didn’t have so many people working at the Genius Bar they could use some of those people to fix security vulnerabilities?
by raw_anon_1111
2/12/2026 at 7:50:45 PM
Are you suggesting that money spent on marketing - to the extent that it doesn't actually increase market share/sales - couldn't be spent on hardening or vulnerability payouts, etc?Apple doesn't have unlimited money. It all gets allocated somewhere. Allocating it in places that don't improve security or usability or increase sales is, in this sense, a wasted opportunity that could be more efficiently allocated elsewhere.
by avazhi
2/12/2026 at 8:05:03 PM
> Are you suggesting that money spent on marketing - to the extent that it doesn't actually increase market share/sales - couldn't be spent on hardening or vulnerability payouts, etc?Yes?
by saagarjha
2/12/2026 at 7:57:50 PM
Well Apple kind of does have unlimited money for all intents and purposes. It’s net income last year was $112 billion.by raw_anon_1111
2/12/2026 at 8:37:31 PM
If Apple had unlimited money they’d just buy the exploit makers at whatever asking price. Or they’d set exploit bounties at a price guaranteed to outbid others etc.No, just like any other company they don’t have unlimited money and my point stands.
by avazhi
2/12/2026 at 9:19:59 PM
Really? You don’t think Apple could “afford” to set aside $500 million dollars for instance to pay off exploit makers? Less than 0.5% of their profit? Or even $1 billion? Less than 1% of their profit?by raw_anon_1111
2/14/2026 at 2:50:56 AM
I don't know, but I would suspect that they don't purchase these companies out of a sense of principle: not wanting to reward the behavior. Yes, that allows them to keep operating, but it's sorta like why you don't pay a ransomware group.by alsetmusic
2/12/2026 at 9:46:19 PM
Huh?Ofc they could afford to, but they don’t. They could alo afford to if they had unlimited money, but in the latter case by definition they’d lose nothing by actually buying.
Given the absurdity of the scenario and its contrivance though I’m not sure what your point is. More money spent on security is good is my point. And if they had more money they’d have more money to spend on security. And if they didn’t spend money on dumb shit like virtue signaling then they’d have more money. That’s the reasoning.
by avazhi
2/12/2026 at 9:57:43 PM
My point is that it’s silly to say that Apple doesn’t have enough money left over after spending money on marketing to pay off people who find security vulnerabilities if they have $110 billion in profit after spending money on marketing.If you had to spend 0.5% of your income for something in a year, would that adversely affect how you chose to spend the other 99.5%?
by raw_anon_1111
2/12/2026 at 8:04:18 PM
Is it not up to you to not write software that leads to people being killed?by saagarjha
2/12/2026 at 8:41:08 PM
Ok? Welcome to earth. We are a violent species. Sometimes people die violently. What’s your point?Lawful killing is, by definition, legal. It’s also justified in certain situations.
Disagree? Cool, so don’t work for the police or Cellebrite lol, but don’t try to impose your idiosyncrasies on others.
by avazhi
2/12/2026 at 8:50:53 PM
If your ethics are “people die so I might as well partake in killing them” I suspect you haven’t really thought this through very thoroughlyby saagarjha
2/12/2026 at 9:41:42 PM
My ethics are that certain people will die in certain circumstances and I’m okay with that. I also have no issues working on something that may result in a person’s death at a later stage. One example might be that if I worked on an automobile assembly line it might occur to me that the car I’m working on would at some point crash and the occupants be killed. But why would I care? There’s a chain of causation that you can surely understand, one that in this case would be broken many times before then (assuming I wasn’t negligent in assembling the car).But again, your condescending tone proves my point. You and I don’t have the same values. That’s okay. But keep yours to yourself and I’ll keep mine to myself, right? That’s my point.
by avazhi
2/13/2026 at 3:52:16 AM
Ethics is making the chain of causation as long as possible.by saagarjha
2/13/2026 at 11:11:29 AM
You're confusing ethics with your own personal views. Ethics is a subject concerning right or wrong. It's neither subjective nor objective - it's just a particular subject encompassing particular issues. Your personal opinion on a particular issue might go some way toward describing what YOU think is ethical behaviour. That's subjective. It describes a factual state (viz., your opinion about something). My opinion may be very different from yours. My opinion is also subjective.If you think never harming any person is the highest human aspiration, then great! I wish you well on that journey. I disagree though, and personally - as a matter of my own morality and philosophy about the world - I think the earth would be a much better place with maybe 1/2 the current population (assuming we could cull the right people). Avoiding causing harm to others isn't really something I care about, and I think there are more important and more interesting things to worry about. I also think killing is absolutely justified under certain conditions and I also think the world would be objectively better off if certain people didn't exist. We disagree about this, but that doesn't mean we aren't both acting ethically. We just have very different ideas about what is good and bad and right and wrong.
Both of us can act ethically despite holding those contrary positions and stay within our own logical frameworks. I hope that makes sense to you.
Now, once again the main point was that doing work for the police or hacking shit for governments is a legitimate occupation and is legal, even if it leads to somebody being executed or arrested or deported (in fact, those are also legitimate things that plenty of people have no problems with). Laws generally reflect society's overall views on some subject matter. Feel free to Google social facts and Durkheim and Hart and the rule of law and theory of laws. Stating such is to state objective facts. If you dislike those occupations, that's cool - some people dislike prostitution, but it's a legitimate and legalised occupation in many places. But your opinion on the matter doesn't delegitimise it, and frankly nobody wants to hear your casting judgment on others based on your own personal opinions. This is the issue with protestors today - nobody else cares, man. Leave people alone lol.
by avazhi
2/12/2026 at 7:04:50 PM
I totally agree, and it's basically theft that Apple simply doesn't have a standing offer to outbid anyone else for a security hole.That said, we all get the same time on this earth. Spending your time helping various governments hurt or kill people fighting for democracy or similar is... a choice.
by x0x0
2/12/2026 at 7:44:50 PM
I don't think democracy is the panacea you seem to think it is, but that's another issue. Certainly, cracking software for governments and the police is no less legitimate an existence and occupation as, say, working for an NGO.by avazhi
2/12/2026 at 4:55:24 PM
Theoretical question. How much more secure will be a Linux device which uses phone as a dumb Internet provider.by blackoil
2/12/2026 at 8:03:07 PM
Linux has few defenses against the compromise of individual programs leading to the whole system being compromised. If you stick to basic tools (command line) that you can fully trust, it might be somewhat resistant to these types of attacks. The kernel might be reasonably secure but in typical setups, any RCE in any program is a complete compromise.Things like QubesOS can help, but it's quite high-effort to use and isn't compatible with any phone I know of.
by digiown
2/12/2026 at 10:24:19 PM
It would at least be diverse.by octoberfranklin
2/12/2026 at 6:58:22 PM
Linux is swiss cheese and your dumb phone is probably full of zero days which will happily mitm you.by baq
2/12/2026 at 7:35:38 PM
If you care about security, you should try Qubes OS.by fsflover
2/12/2026 at 7:28:52 PM
There is one non-technical countermeasure that Apple seems unwilling to try: Apple could totally de-legitimize the secondary access market if they established a legal process for access their phones. If only shady governments require exploits, selling access to exploits could be criminalized.by fweimer
2/12/2026 at 7:58:36 PM
We have a word for this: a backdoor. It wouldn't de-legitimize the secondary access market. It would just delegitimize Apple itself to the same level. Apple seems to care about its reputation as the defender of privacy, regardless of how true it is in practice, and providing that mechanism destroys it completely.by digiown
2/12/2026 at 7:34:55 PM
It would not completely de-legitimize it. Maybe a government doesn't want anyone to know they are surveilling a suspect. But it definitely would reduce cash flow at commercial spyware companies, which could put some out of business.by 9cb14c1ec0
2/12/2026 at 7:57:20 PM
Your opinion is that Apple should have just handed over Jamal Khashoggi‘s information to the Saudi Arabian agents who were trying to kill him, because then Saudi Arabia wouldn’t have been incentivized to hack his phone? I think you’ll find most people’s priorities differ from yours.by ikmckenz
2/12/2026 at 7:57:20 PM
As many people in this space have found out recently, there is no real thing as a non-shady government.by saagarjha
2/12/2026 at 4:10:47 PM
>It's worth doing (Apple patching) but a reminder that you are never safe from a determined adversary.I hate these lines. Like yes NSA or Mossad could easily pwn you if they want. Canelo Alvarez could also easily beat your ass. Is he worth spending time to defend against also?
by vonneumannstan
2/12/2026 at 4:15:07 PM
Yes, because Apple can do it at scale.by high_na_euv
2/13/2026 at 1:06:17 AM
You’re missing the point. If they don’t believe that they’re targeted, how are they going to be able to LARP online?by UqWBcuFx6NV4r
2/12/2026 at 4:23:52 PM
Yes. If vendors do not take this seriously, these capabilities trickle down to less sophisticated adversaries.by Eridrus
2/12/2026 at 4:23:44 PM
and if you point out that Apple's approach is security by obscurity with a dollop of PR, you get downvoted by fan bois.Apple really need to open up so at very least 3rd parties can verify integrity of the system.
by varispeed
2/12/2026 at 5:17:08 PM
They shipped MTE on hundreds of millions of devices. Is that security by obscurity or PR?by wat10000
2/12/2026 at 6:35:38 PM
Memory Tagging Extension is an Arm architectural feature, not an Apple invention. Apple integrated and productised it, which is good engineering. But citing MTE as proof that Apple’s model is inherently superior misses the point. It doesn’t address the closed trust model or lack of independent system verification.by varispeed
2/12/2026 at 6:45:48 PM
Your claim wasn't about inherent superiority or who invented what, your claim was "that Apple's approach is security by obscurity with a dollop of PR." The fact that they deployed MTE on a wide scale, along with many other security technologies, shows that not to be true.by wat10000
2/12/2026 at 8:45:13 PM
Shipping MTE doesn’t refute my point.MTE is an Arm architectural feature. Apple integrated it, fine. That’s engineering work. But the implementation in Apple silicon and the allocator integration are closed and non-auditable. We have blog posts and marketing language, not independently verifiable source or hardware transparency.
So yes, they deploy mitigations. That doesn’t negate the fact that the trust model is opaque.
Hardening a class of memory bugs is not the same thing as opening the platform to scrutiny. Users still cannot independently verify kernel integrity, inspect enforcement logic, or audit allocator behaviour. Disclosure and validation remain vendor-controlled.
You’re treating ‘we shipped a mitigation’ as proof against ‘the system is closed and PR-heavy.’ Those are different axes.
by varispeed
2/12/2026 at 8:51:44 PM
"Security by obscurity" does not mean "closed." It specifically means that obscurity is a critical part of the security. That is, if you ever let anyone actually see what was going on, the whole system would fall to pieces. That is not the case here.If what you meant to say was "the system is closed and PR-heavy," I won't argue with that. But that's a very different statement.
by wat10000
2/12/2026 at 7:51:26 PM
[flagged]by renato_shira
2/12/2026 at 10:26:34 PM
"trust the platform"yeah stop doing that.
by octoberfranklin