[HN Gopher] Apple previews Lockdown Mode
       ___________________________________________________________________
        
       Apple previews Lockdown Mode
        
       Author : todsacerdoti
       Score  : 792 points
       Date   : 2022-07-06 17:01 UTC (5 hours ago)
        
 (HTM) web link (www.apple.com)
 (TXT) w3m dump (www.apple.com)
        
       | mensetmanusman wrote:
       | Will this be available to Chinese residents? Huge if so.
        
       | tialaramex wrote:
       | > Most message attachment types other than images are blocked.
       | 
       | Who wants to bet that this reflects minimum requirements dictated
       | for user experience, rather than reflecting what Apple are
       | actually securing today ?
       | 
       | The correct model here, the one that would actually defeat these
       | adversaries, is to start with what you can actually secure and
       | expand from there, prioritising customer needs. This delivers
       | security improvements for all customers, but it makes the
       | calculus simple for Lockdown customers, whatever Lockdown allows
       | will be OK.
       | 
       | Suppose today Apple has a working safe BMP reader, and a working
       | safe WAV reader, but they're still using their ratty JPEG and MP3
       | implementations. As described, this feature says you can receive
       | a JPEG attachment (which takes over your phone and results in
       | your cousin who remains in the country being identified as a
       | contact and imprisoned) but you can't listen to the WAV file an
       | informant sent you because that's "dangerous"...
        
         | S0und wrote:
         | I find is absolutely hilarious that they've kept the images in
         | Messages while one of Pegasus attack vector was sending a PSD
         | file as a *.gif, which crashed Messages parser.
         | 
         | Apple is over confident in it ability.
         | 
         | https://arstechnica.com/information-technology/2021/09/apple...
         | 
         | People who need this have already a dumb phone, using this
         | Lockdown mode is an unnecessary gamble on they part.
        
       | galoisscobi wrote:
       | I wonder if this mode would be helpful to protect myself if US
       | border control forces me to unlock my phone so they can make a
       | copy of all of my phone contents.
        
         | [deleted]
        
         | kylehotchkiss wrote:
         | I'm excited about this mode for traveling outside the US, where
         | other governments seem to be backsliding against privacy much
         | more quickly
        
         | nielsbot wrote:
         | Can you be forced to unlock your phone at the border? I thought
         | you couldn't. (I don't actually know.)
         | 
         | BTW bringing up the power off UI on iPhone (holding power and
         | up buttons at the same time) disables FaceID/TouchID until a
         | passcode is entered.
        
           | andrewia wrote:
           | They can search your phone at the US border.
           | https://www.theverge.com/2021/2/10/22276183/us-appeals-
           | court...
        
           | kersplody wrote:
           | If you are a US Citizen or Permanent Resident, Border Patrol
           | cannot prevent you from entering the United States. They can,
           | however, detain you for up to 72 hours and confiscate the
           | locked device if they have "reasonable suspicion". The
           | confiscated property will be returned eventually.
           | 
           | https://www.cbp.gov/sites/default/files/documents/inspection.
           | ..
           | 
           | If you are not a US citizen, refusal to unlock a phone and
           | allow inspection, inclusive of allowing access to social
           | media and corporate apps, will probably result in denied
           | entry. They also have the right to detain you until
           | indefinitely until you unlock the phone if they have
           | "reasonable suspicion", but requires a court order within 72
           | hours.
           | 
           | Most foreign counties have similar rules in place for
           | residents and non-residents.
        
             | sneak wrote:
             | They don't usually return the devices they steal, and most
             | people travel with a total device value lower than the cost
             | of an attorney and lawsuit to force the return.
        
           | sneak wrote:
           | You can be forced to unlock it with biometrics, but not a
           | password/code.
           | 
           | They also get to steal it and keep it if they want.
        
           | Nextgrid wrote:
           | Pressing it 5 times does the same (and starts an emergency
           | call countdown if you have that enabled). Also, removing the
           | SIM also locks it out.
        
             | matwood wrote:
             | You can also say 'hey siri, whose phone is this?'
        
           | numpad0 wrote:
           | The sterile area between the gate and the border control is
           | treated as international waters/lands, which sounds fine, and
           | IIUC there is the logic that _laws don 't apply_ there so you
           | can be forced-forced anything free from constitutional
           | protections. Not sure if that actually works though.
        
             | happyopossum wrote:
             | This is completely incorrect. Here's the actual law
             | 
             | https://www.cbp.gov/sites/default/files/documents/inspectio
             | n...
        
         | kersplody wrote:
         | It would be a good idea to enable this before going though any
         | border controls. Doubly so for countries that require apps to
         | be installed before entry/upon entry/after entry.
         | 
         | ArriveCAN (Canada), Mobile Passport Control (USA), WeChat
         | (China), and other mandatory government apps would be perfect
         | vectors to stage highly targeted attacks.
        
         | [deleted]
        
         | kube-system wrote:
         | If someone has your unlocked phone, they can look at the
         | screen.
        
       | xtat wrote:
       | TBH even 2m bounty on lockdown mode bypass seems really low
        
       | amelius wrote:
       | What they think will happen: users activate Lockdown Mode to
       | protect themselves.
       | 
       | What actually happens: criminals activate Lockdown Mode to evade
       | law enforcement.
        
         | Analemma_ wrote:
         | Lockdown mode is for preventing 0-days. Law enforcement does
         | not burn 0-days on common criminals, they get a warrant and get
         | into the device that way.
        
       | duxup wrote:
       | I was wondering when a "hardened" option would come.
        
       | [deleted]
        
       | matthewdgreen wrote:
       | Last year I wrote: "In the world I inhabit, I'm hoping that Ivan
       | Krstic wakes up tomorrow and tells his bosses he wants to put NSO
       | out of business. And I'm hoping that his bosses say 'great:
       | here's a blank check.' Maybe they'll succeed and maybe they'll
       | fail, but I'll bet they can at least make NSO's life
       | interesting." [1]
       | 
       | Maybe this is the blank check :)
       | 
       | [1] https://news.ycombinator.com/item?id=27897975
        
       | bombcar wrote:
       | Everything else to the side, this is excellent marketing on the
       | level of Tesla's "bioweapons filtering mode".
        
       | O__________O wrote:
       | ///// Re: Bounty
       | 
       | From press release, "Bounties are doubled for qualifying findings
       | in Lockdown Mode, up to a maximum of $2,000,000 -- the highest
       | maximum bounty payout in the industry."
       | 
       | Appears Apple is not aware there was a $10 million bounty [1]
       | paid out; unless when they say "by industry" they mean phones,
       | not bug bounties.
       | 
       | If Apple really believed it was secure, then even a $100 million
       | bounty shouldn't be a concern; 2 million, while clearly high, is
       | no longer enough to pull in the best bounty hunters, in my
       | opinion.
       | 
       | ///// Re: Naming
       | 
       | Name conflicts with existing terms both Apple and consumers use.
       | Naming should be unique so it's possible to Google the unique
       | name for this feature and only get valid search results.
       | 
       | ///// Re: iCloud
       | 
       | While iMessage features are limited, it is neither blocked, nor
       | is iCloud -- and both are known to being vulnerable to nation
       | state demands on Apple due to iCloud not being end-to-end
       | encrypted.
       | 
       | ///// Re: iCloud end-to-end encrypt
       | 
       | If Apple was serious about the topic, they would have already
       | rolled out end-to-end encrypt for iCloud years ago.
       | 
       | ///// Re: Targeting
       | 
       | If Apple is logging if this feature is on and sending it back to
       | Apple, it will result in targeting from nation states even if
       | this feature is "invincible" - which I have no reason it is;
       | basically, nation states demand list of users subject to its
       | jurisdiction.
       | 
       | ///// Re: Off vs Locked
       | 
       | "Wired connections with a computer or accessory are blocked when
       | iPhone is locked." -- Why is this not the default with an opt-in?
       | Further, at the point you're turning on this features, when
       | locking the phone it should explicitly tell the user of the risk
       | of locking vs turning the phone off. Lastly, when you turn an
       | iPhone off, it should really be off if set to this mode; if it
       | is, and activity is detected, likely good sign something is going
       | on.
       | 
       | _______
       | 
       | [1] https://medium.com/immunefi/wormhole-uninitialized-proxy-
       | bug...
        
         | barbarousbull wrote:
        
       | c1sc0 wrote:
       | And yet this feels like it's too little too late. If I'm likely
       | to be the target of the kind of state-sponsored malware "lockdown
       | mode" supposedly protects me from I shouldn't have been using
       | Apple products in the first place. Which begs the question: what
       | are current security best practices to protect from state-level
       | hostile actors?
        
         | savoytruffle wrote:
         | The current best practice is to have already been using an
         | Apple device, and this will enhance that.
        
           | c1sc0 wrote:
           | Really? Not something like Tails or Qubes? Am I too paranoid?
           | I'm genuinely interested in learning about this. What _am_ I
           | supposed to use these days when I'm working on a project that
           | would make me a target for state-level actors?
        
             | duskwuff wrote:
             | Tails and Qubes are desktop operating systems. You can't
             | run them on a smartphone.
        
       | sk8terboi wrote:
        
       | brundolf wrote:
       | > Web browsing: Certain complex web technologies, like just-in-
       | time (JIT) JavaScript compilation, are disabled unless the user
       | excludes a trusted site from Lockdown Mode.
       | 
       | That's very cool actually. You can keep JS enabled but choose to
       | make it run more slowly in exchange for better sandboxing
        
       | GuB-42 wrote:
       | So Apple is saying that their "Lockdown Mode" protects against
       | "highly targeted cyberattacks from private companies developing
       | state-sponsored mercenary spyware".
       | 
       | That's an interesting wording, because it claims to protect you
       | against... nothing that matters. Notably, it doesn't protect you
       | against:
       | 
       | - The police. Don't get me wrong, I am all for letting the police
       | do its job fighting crime, even if it means hacking iPhones, but
       | even if you got the police attention for a noble cause, Lockdown
       | Mode won't save you, at least, it doesn't claim to.
       | 
       | - Foreign governments, as well as your own government. Notice how
       | it mentions "private companies" specifically, as in, not public.
       | And the cyberattacks themselves have to be performed by private
       | companies, if the tools that these companies develop are used by
       | government entities, it doesn't count.
       | 
       | - Cybercriminals, the kind who are after your money. They are not
       | "private companies", and they are usually not state-sponsored.
       | 
       | - Terrorist organizations, mafias, drug cartels, etc... again,
       | not "private companies", and while they may be backed by states,
       | they typically work for themselves.
       | 
       | The technical aspects have value, and I think giving the user the
       | choice of wearing a tinfoil hat is great, but the claim they are
       | making is deceivingly weak if you read carefully.
        
         | ngetchell wrote:
         | The NSO group used links and attachments in iMessage. These
         | protections would mitigate those attacks.
        
       | swayvil wrote:
       | Inflation, pollution, censorship, global warming...
       | 
       | Hey no, don't look at that, look over here instead. We're playing
       | ratfuck with the abortion laws.
       | 
       | Magicians call that "misdirection".
        
       | Nextgrid wrote:
       | Most of the features of this lockdown mode should be on by
       | default.
        
         | egberts1 wrote:
         | ESPECIALLY the disabling of JavaScript, because ... malicious
         | JacaScript.
        
           | phoe-krk wrote:
           | This does not seem to disable JS altogether, only JS JIT
           | compilation. IIUC, JS will still be executed, although via an
           | interpreter (which is safer) rather than via compiled machine
           | code (which might be used to exploit memory safety bugs such
           | as type confusion, somewhat frequent on the JS side).
        
             | egberts1 wrote:
             | which in my cybersecurity book is considered a "miss".
        
               | Nextgrid wrote:
               | FYI, if you mean that it should disable JS completely
               | then you can already do that in Settings -> Safari.
        
         | jimt1234 wrote:
         | Totally agree. I'm also concerned about the fine print, what
         | Apple is _not_ announcing - like,  "Oh, we also updated our
         | EULA to reflect that metadata from phones with 'lockdown mode'
         | enabled will be forwarded to the FBI", something like that.
        
       | someguydave wrote:
       | This lockdown mode looks like what ought to be default security
       | behavior.
        
         | andrewia wrote:
         | It slightly degrades some experiences, so I see why it's
         | disabled by default. Disabling JIT JavaScript is going to make
         | web browsing more painful. And incoming friend requests are
         | useful because it simplifies things when two people are adding
         | each other to their phones - one sends a request and the other
         | reciprocates.
        
           | jka wrote:
           | > It slightly degrades some experiences, so I see why it's
           | disabled by default.
           | 
           | My sense is that the functionality to provide those
           | experiences resulted in a decrease in user security and
           | privacy when they were introduced -- and that those risks
           | were widely-discussed and well-understood.
           | 
           | It's weird (although not unexpected) to see the reversal of
           | them touted as a selling point.
        
           | JCWasmx86 wrote:
           | > Disabling JIT JavaScript
           | 
           | With a bit of luck, this will cause site operators to reduce
           | their usage of unnecessary JS, so maybe this has positive
           | impacts :)
        
       | egberts1 wrote:
       | Too bad that Google does not offer this same "Lockdown Mode" as
       | Apple does.
       | 
       | Instead, they (Google Play Store) removed our ability to see what
       | "app privileges" that an app would required BEFORE we do the
       | installation step from the Google Play Store. What we got instead
       | was an obfuscated "Data Security" section that is pretty much
       | always "blank".
       | 
       | My flashlight app should not require GAZILLION app privilegeS nor
       | hide that fact before I can determine whether I can safely
       | install it, much like Apple App Store can do by doing the CRUCIAL
       | pre-reveal of any needed app privilege(s) ... for our leisure
       | perusual and applying any applicable but personalize privacy
       | requirement BEFORE we do the app install.
        
         | okneil wrote:
         | Whilst not quite the same, Google does offer the Advanced
         | Protection Program for accounts.
         | 
         | https://landing.google.com/advancedprotection/
        
         | einpoklum wrote:
         | > they (Google Play Store) removed our ability to see what "app
         | privileges" that an app would required
         | 
         | Don't use Google Play Store, then. There are other APK
         | repositories.
        
         | andrewia wrote:
         | Google removed the install-time permissions dialog because they
         | replaced it with runtime permissions. This makes sense - some
         | users wants PayPal or WhatsApp to access their contact list,
         | and others won't. It also fixes "permission blindness", where
         | users blindly accept a long list of permissions because they
         | need the app, or just stop caring because it's too much to
         | comprehend all at once.
         | 
         | Obviously, this isn't perfect, especially since Google removed
         | the internet permission and allowed all apps to access it.
         | Allowing advanced users like us to toggle off internet access
         | in the "App info" permission page would be a good compromise,
         | and I hope and Android team does so to match Apple on their
         | security efforts.
        
           | varispeed wrote:
           | You should be able to review the list of required permissions
           | before installing the app anyway.
           | 
           | I find it frustrating when I install a simple app and it asks
           | me for every permission possible. Waste of time.
        
           | egberts1 wrote:
           | Fixes "permission blindness"? So, the current form of Google
           | Play (app) Store "Data Security" section of each app being
           | shown as "(blank)" is surely yet another form of "permission
           | blindness".
           | 
           | Google Play Store being proactive in protecting these end-
           | users from their own form of stupidity (or "permission
           | blindness", as you have eloquently pointed out) is just
           | opening themselves to potential liability ramifications
           | instead of deferring to end-user's responsibility of
           | maintaining their own privacy.
           | 
           | I think that the term "permission blindess" is better
           | referred to as an app having zero privilege.
           | 
           | And "App Privileges" should have referred to runtime
           | permissions and should have been displayed in the first place
           | at the Google Play Store instead of install-time privileges.
        
             | vorpalhex wrote:
             | Your apps have no permissions until you allow them. If you
             | install spyware and it wants all your contacts and files it
             | has to ask. You simply select "no" and then remove it.
             | 
             | Apps would force you to consent to eg contact permissions
             | "in case you want to share something to a contact" and then
             | harvest all your contacts. Apps can no longer use that
             | pretense.
        
               | egberts1 wrote:
               | you get prompted for such granularity of privacy AFTER it
               | gets installed but not before you could preview such app
               | settings.
        
               | vorpalhex wrote:
               | Yes. It has no access after being installed and before
               | prompting. What exactly is the issue?
        
           | cmroanirgo wrote:
           | It's taken a decade, but it's pretty much moved back to the
           | permission model that j2me had, which iOS and Android
           | deliberately removed & sold as better UX. Seems like the
           | original devs of j2me knew what they were doing - only the
           | joe public's weren't ready for permission popups then like
           | they are now. :sigh:
        
         | javajosh wrote:
         | Google hiding information about apps in the app store is a big
         | problem - but its not as big a problem as not having a Little
         | Snitch equivalent built into Android. This alone is a reason
         | for real capital to be spent on startups in the alt-android
         | space. Imagine a company that lets you use your current Samsung
         | or Google or Sony or ASUS or whatever flagship phone, but with
         | a truly open-source fork of Android with a Little Snitch built
         | in, and security updates guaranteed for as long as you stay
         | current with your subscription, which is like $5/mo. (Maybe
         | that's too low). Maybe you could even wipe your device and mail
         | it in to have the software installed if you can't be bothered
         | to do it yourself. Or maybe even a partnership with a phone
         | repair chain. (And if you don't want to pay the fee you can
         | always install updates yourself manually, from source.)
        
           | ignoramous wrote:
           | > _Imagine a company that lets you use your current Samsung
           | or Google or Sony or ASUS or whatever flagship phone, but
           | with a truly open-source fork of Android with a Little Snitch
           | built in, and security updates guaranteed_
           | 
           | You describe the direction CalyxOS / DivestOS are going. And
           | of course, there's the Pixel phones on GrapheneOS which
           | arguably is _more_ security-focused.
        
       | newscracker wrote:
       | I hope Apple expands this quickly through minor updates to the OS
       | rather than waiting for a next major release. This needs faster
       | iteration than anything else.
       | 
       | Quoting what's in the first release:
       | 
       |  _> At launch, Lockdown Mode includes the following protections:
       | 
       | > Messages: Most message attachment types other than images are
       | blocked. Some features, like link previews, are disabled.
       | 
       | > Web browsing: Certain complex web technologies, like just-in-
       | time (JIT) JavaScript compilation, are disabled unless the user
       | excludes a trusted site from Lockdown Mode.
       | 
       | > Apple services: Incoming invitations and service requests,
       | including FaceTime calls, are blocked if the user has not
       | previously sent the initiator a call or request.
       | 
       | > Wired connections with a computer or accessory are blocked when
       | iPhone is locked.
       | 
       | > Configuration profiles cannot be installed, and the device
       | cannot enroll into mobile device management (MDM), while Lockdown
       | Mode is turned on._
       | 
       | I'm not a target (I think, and hopefully don't get to be one),
       | but nevertheless I'd feel safer with this turned on (I very
       | rarely use FaceTime, so not accepting it is not a big deal).
       | 
       | I'd also love more protections. Not allowing specific apps to
       | connect to any network (WiFi included), Apple handling issue
       | reports on apps with urgency (right now they seem to be ignored
       | even when policy violations which are against the user's
       | interests are reported), etc.
        
         | perardi wrote:
         | I think it's reasonable to think Apple will iterate quickly on
         | this.
         | 
         | Why? The iOS 15.x update history.
         | 
         | https://en.wikipedia.org/wiki/IOS_15
         | 
         | Lots and lots of privacy stuff in the point releases. (And
         | accessibility stuff, they've been on a tear there.) They're
         | still in a monolithic mindset when it comes to the "big" apps,
         | but they're iterating faster on these sorts of things as the
         | release cycle goes along.
        
           | alwillis wrote:
           | You might have missed that Apple announced realtime security
           | updates at WWDC [1].
           | 
           | [1]: https://techcrunch.com/2022/06/07/apple-introduces-real-
           | time...
        
             | concinds wrote:
             | That includes fast, no-reboot, and invisible-to-the-user
             | security patches, not improvements in features like
             | Lockdown Mode.
        
         | PoignardAzur wrote:
         | > _I'm not a target (I think, and hopefully don't get to be
         | one), but nevertheless I'd feel safer with this turned on (I
         | very rarely use FaceTime, so not accepting it is not a big
         | deal)._
         | 
         | Good. We need people with nothing to hide to turn Lockdown Mode
         | on, so that Lockdown Mode isn't a telltale signal that you have
         | something to hide.
        
         | erichurkman wrote:
         | Aside from the JIT change, those all sound like pluses to me!
        
       | [deleted]
        
       | xyst wrote:
       | Is the apple bounty program still terrible in terms of payout and
       | length of time to approval?
       | 
       | I can't see many people submitting bounty reports if it's too
       | much of hassle or not worth the effort.
       | 
       | Since the apple ecosystem is mostly proprietary, it's hard to
       | gauge as individuals if this just provides a false sense of
       | security or not against "state actors".
        
       | ProAm wrote:
       | Apple is not stopping state-sponsored anything. They do not have
       | the expertise nor willing to invest enough to stop it. And they
       | also turn everything over they can at a local-law enforcement
       | request, because they have to.
        
       | _the_inflator wrote:
       | "Web browsing: Certain complex web technologies, like just-in-
       | time (JIT) JavaScript compilation, are disabled unless the user
       | excludes a trusted site from Lockdown Mode."
       | 
       | Highly interesting, that Apple is doing this. This is a thing. MS
       | and Google are also taking steps to harden Chromium security
       | against JIT compiler issues with JavaScript.
       | https://www.zdnet.com/article/securing-microsoft-edge-switch...
        
         | colechristensen wrote:
         | I just don't want most of the programming capabilities on the
         | web, plain old hypertext with a bit of style is enough. There
         | are plenty of other ways to run software on a computer than
         | inside a web browser.
        
           | capableweb wrote:
           | Most (if not all) browsers allow you to disable JS, so that
           | seems like the perfect preference for you. I know it works on
           | Chrome and Firefox on desktop (I use the NoScript extension
           | myself, that blocks JS by default but allows you to enable it
           | per-site), I can imagine it works the same on smartphones as
           | well.
        
             | olliej wrote:
             | I /think/ what they're asking for is a world where turning
             | JS off is actually a real option. Currently the web
             | essentially does not work in such a case, so while it
             | technically exists the option to disable JS isn't actually
             | an real option.
        
           | simion314 wrote:
           | I agree half way with you, we need the web split into 2
           | parts, webpages and apps.
           | 
           | I seen some cool simulation, small apps, small games that I
           | can just test online and not have to install them on my
           | machine. Apple would love that we all got scared and only use
           | installed apps from their store but the web is a decent
           | deliver platform.
           | 
           | If we could have a modern subset of html and css for news
           | websited and blogs , and the rest of js for web apps then you
           | can have the option to turn off teh advanced settings or we
           | could have different browsers that could focus on different
           | things, like a website reader browser that does not care
           | about super fast JITed JS it would not support webgl,camera
           | or microphone acccess, it would just focus on text layout and
           | simple forms,
           | 
           | and a web app browser that focuses on extreme optimizing for
           | JS , canvas and webgl operations, camera and microphone
           | access.
        
             | peoplefromibiza wrote:
             | I'm having fun with Gemini exactly because it's so dumbed
             | down that you can't do anything more than publish text
             | 
             | It's still very niche, but it's growing and the protocol is
             | so simple that I'm writing software for it, specifically a
             | multi platform browser (more like a viewer?)
        
             | capableweb wrote:
             | You can already achieve all this. Either turn of JS in your
             | browser, or use extensions such as NoScript.
        
               | npteljes wrote:
               | You can technically achieve this, but you get a degraded
               | experience. Most sites don't test for JS being turned
               | off, and it's not rare to only get a blank page when
               | viewing a site in that way.
               | 
               | What OP wishes for is rather an experience that decidedly
               | doesn't use JS, similar to Google's AMP or Gemini. A
               | subset of HTML that makes publishing possible, without
               | moving parts.
        
               | simion314 wrote:
               | Actually I browse with JS off by default and whitelist
               | stuff, ironic since I am a web dev (or maybe the fact I
               | know how shit web tech is is why I think documents should
               | be documents , imagine I want to show you my blog but I
               | make an Unreal Engine 5 app because I want some cool
               | effects and I also want to learn this shiny tool and the
               | marketing team wants to do some shitty things too)
        
         | [deleted]
        
       | blintz wrote:
       | I am so excited about this news. I understand that some people
       | are pessimistic, and view it as a "giving up" on complete
       | security against nation-states. I think that's the wrong way to
       | analyze the situation.
       | 
       | The dream I have is someone making a phone that is purpose-built
       | to be secure against state actors. Unfortunately, this makes very
       | little economic sense, and probably won't happen (maybe if some
       | rich person started a foundation or something?). The phone would
       | need to have pretty restricted functionality and would not be
       | generally appealing to mass market consumers.
       | 
       | As it stands, securing a mass market modern smartphone, even from
       | just remote attacks, is just intractable. We should not bury our
       | heads in the sand and wishfully think that if they just spend a
       | little more money, close a few more bugs, and make the sandboxing
       | a little better, somehow iOS 16 or Android 13 will finally be
       | completely secure against state actors. The set of features being
       | shipped will grow fast enough that security mitigations will not
       | someday 'catch up'.
       | 
       | This is the next best thing! The more we can give users the
       | _freedom_ to lock down their devices, the more the vision of an
       | actual solution comes into view. This is the first step towards
       | perhaps our only hope of solving this someday - applying formal
       | methods and lots of public scrutiny to a small  'trusted code
       | base', and finally telling NSO group to fuck off.
       | 
       | Even this dream may not pan out, but at least we can have hope.
        
         | germandiago wrote:
         | The potential a phone like that would have if you explained
         | people how states can and _do put_ their nose into their lives
         | is quite big IMHO. It is just that people have no idea of how
         | much they can take from your info through a phone.
        
           | Nextgrid wrote:
           | The problem 90% of cases is the user himself. Advanced
           | attacks such as spyware-for-hire with zero-days and stuff
           | only affect a minority of users. For the fast majority, the
           | vulnerabilities are much simpler: password
           | reuse/carelessness, malware on other devices (laptop, etc)
           | that also has access to their data, willingly sharing too
           | much information, etc.
           | 
           | You don't need a special phone or hardened OS to defend
           | against that, and users vulnerable to this will remain just
           | as vulnerable regardless of how much hardening there is.
        
           | Fargren wrote:
           | In general, I'm much more concerned with private actors than
           | state actors. I'm aware of multiple ways in which companies
           | use information to try to extract money from me, and they
           | actively make my life worse in the attempt.
           | 
           | I have a much harder time thinking about how giving states
           | access to my information has been harmful for me. I can think
           | of potential harms, if the state started doing religious or
           | ethnic persecution(not trying to diminish the chance of this,
           | but not a problem today) so I'm aware of potential threats.
           | But other than that... What exactly should I be worried
           | about?
        
           | runnerup wrote:
           | Most people couldn't grasp the important ramifications even
           | if you walked them through it from first principles. I'm not
           | sure I can despite being very interested in information
           | entropy my whole life.
           | 
           | A lot of people really don't understand much at all about
           | anything that they don't constantly see and touch their whole
           | lives. A lot of people truly just live in the moment
           | constantly and use their higher order thinking for social
           | navigation and sex.
        
         | awll wrote:
         | I feel like the closest you can come to the dream of a phone
         | that is secure against state actors today would be a google
         | pixel phone running graphene os.
        
         | dark_star wrote:
         | Bunnie Huang is working on Betrusted [1], a communications
         | device that is designed to be secure from state actors. The
         | first step is Precursor (about: [2], purchase:[3]) the hardware
         | and OS that will be the platform for the communications device.
         | 
         | It's designed to be secure even though it communicates via
         | insecure wifi, for instance via tethering or at home. The CPU
         | and most peripherals are in an FPGA with an auditable bitstream
         | to program the device to ensure there are no back doors.
         | Hardware and software are all open source. It has anti-tamper
         | capability.
         | 
         | It looks well-thought-out.
         | 
         | 1. https://betrusted.io/
         | 
         | 2. https://www.bunniestudios.com/blog/?p=5921
         | 
         | 3. https://www.crowdsupply.com/sutajio-kosagi/precursor
        
           | stjohnswarts wrote:
           | Unless you design the FPGA inhouse and make it in your own
           | Fab how would you know it's secure? Taiwan and Korea owe the
           | US a lot of favors...
        
             | samatman wrote:
             | FPGAs just have a much lower essential complexity.
             | 
             | Adding one undocumented latch is enough to undermine an
             | ASIC CPU. To do that to an FPGA, you'd have to know where
             | the layout engine is putting the circuit you intend to pwn,
             | and good luck with that staying still under any revision.
             | 
             | If this did become a problem, a technique analogous to
             | memory randomization could be employed to make any given
             | kernel unique from the hardware's perspective.
        
             | buildbot wrote:
             | You can't of course know, but modifying the mask of a
             | modern chip (millions of dollars by itself), slipping those
             | mask(s) (you need many, one per layer of material) into
             | production to target a subset of devices, in a way that
             | lets you inject faults and lets you own the design the FPGA
             | is emulating, is nuclear power level. And would imagine
             | they would not risk it very often if at all due to the
             | fallout it could cause.
             | 
             | A microcontroller on 130nm? Different story probably. Still
             | crazy hard
        
         | RonMarken wrote:
         | Realistically you cannot win against a resourceful adversary
         | every time. But merely painting the situation through the lens
         | of premature surrender is also a disservice.
         | 
         | It will be interesting to see what third-party researchers
         | discover about these new protections. Might remember something
         | about Apple rewriting format parsers for iMessage in memory-
         | safe language with sandboxing as Blastdoor and it was
         | discovered there was still plenty of attack-surface in the
         | unprotected parsers.
        
         | [deleted]
        
         | PuppyTailWags wrote:
         | I would suspect any phone designed to resist a state-level
         | actor, that is made available to me (a regular citizen) would
         | 100% be a honeypot for a state level actor.
        
           | wmf wrote:
           | https://www.vice.com/en/article/y3d3dx/doj-charges-anom-
           | infl...
        
           | godelski wrote:
           | In fact, several phones which have been advertised as such
           | have been honeypots from state level actors.
        
             | Swenrekcah wrote:
             | Which ones? Not challenging you, just curious.
        
               | Entinel wrote:
               | https://www.pcmag.com/news/fbi-sold-criminals-fake-
               | encrypted...
        
               | bilekas wrote:
               | That's crazy! Straight out of the Wire.
        
               | hyperionplays wrote:
               | Australian Federal Police did it as well:
               | https://www.theguardian.com/australia-
               | news/2021/sep/11/insid...
        
             | usrn wrote:
             | Security as a service is going to be a honeypot 100% of the
             | time.
        
               | godelski wrote:
               | This comment feels disingenuous to me, but maybe I'm
               | misinterpreting. Security features are always a service
               | but there are real apps that provide real security.
               | Signal and Matrix provide real encryption for
               | communication. There's even mainstream products that do,
               | like iMessage or Gmail, though these tend to be more
               | selective about what is secure and what isn't (typically
               | through walled gardens). Apple and Google both use
               | federated learning, which is at least a step better than
               | your typically data "anonymization." I agree that there's
               | not enough push for serious security, especially as a
               | default, but I also am not pessimistic on the subject
               | either.
        
               | contingencies wrote:
               | Signal wants your PSTN ID = real world ID, wants contacts
               | from your phonebook which on Google phones generally
               | means already cloudified, and is itself distributed
               | through Google Play. Further, IIRC it's US-based so
               | subject to acts of intervention from on high. I would be
               | _strongly_ suspicious of any metadata security claims,
               | even if it nominally provides message or session-level
               | encryption. Metadata is bad news.
        
               | astrange wrote:
               | I assume you're an FBI agent trying to encourage people
               | to install your real cooler encrypted app that's not on
               | the store and only available via sideloading.
               | 
               | https://nymag.com/intelligencer/2021/06/fbi-snooped-on-
               | crimi...
        
               | contingencies wrote:
               | Heh, nice one. Not that it's my area, but in case the
               | above was not decodable as sarcasm to other readers,
               | following the evidence-based / defense-in-depth
               | strategies I'd personally recommend not using phones at
               | all (far too little control in general) and instead
               | recommend seeking out auditable (open source) software on
               | actual machines you have a hope to control for secure
               | communications. It's a deep rabbit hole with diminishing
               | returns, though.
        
               | cowtools wrote:
               | sms and email are insecure-by-default protocols.
               | Gmail/imessage extend them which necessarily will create
               | vendor-lock in when the extension relies on some
               | centralized service, the extensions are private, and the
               | implementations are closed source.
               | 
               | Matrix fixes this, but only in the sense that they
               | replace the whole protocol without reverse compatibility.
        
               | stjohnswarts wrote:
               | It's definitely tin-foil-hat level. Obviously if you're a
               | spy you're gonna have to have next level stuff, most of
               | us aren't Jason Bourne, even we'd like to think we are.
        
             | stjohnswarts wrote:
             | anyone big like samsung, lg, or apple? I'd love to see
             | those articles and teardowns.
        
           | px43 wrote:
           | IMO Bunnie has the technical skills and the reputation to
           | pull it off though.
           | 
           | I think it has about zero chance of withstanding physical
           | attacks, which is important to me in a phone, but it's a nice
           | effort.
        
           | stjohnswarts wrote:
           | Gotta trust somebody at some point? Otherwise you have to
           | live off the grid in the woods eating squirrels and mushrooms
        
           | ajsnigrutin wrote:
           | Most of the people in charge, only care about what state the
           | "bad"/"good" actors are from, so preferably, "our guys"
           | should be able to do everything, and "theirs" nothing.
        
           | newsclues wrote:
           | And yet we got TOR because it was required for National
           | Security.
        
             | cowtools wrote:
             | TOR is no magic bullet
        
               | newsclues wrote:
               | No, but it was a layer of security required by DoD so it
               | was created and continues to exist.
               | 
               | The same need for modern communications (phones) exists.
        
         | samstave wrote:
         | >>" _...a "giving up" on complete security against nation-
         | states..._
         | 
         | DEFINE:
         | 
         | State Actors: [0]
         | 
         | As one who is acting on " _behalf_ " of a government.........
         | 
         | What if said _government_ was actually an arm of the corporate
         | entities as the state ACTING at their behest?
         | 
         | Crazy, I know.
         | 
         | [0] https://en.wikipedia.org/wiki/State_actor
        
         | ransom1538 wrote:
         | I want deniability. After watching the videos from Ukraine of
         | Russians pulling out citizens from cars forcing them to unlock
         | their phone with guns to their heads -- I want a way to hand
         | someone a phone, unlock it, and STILL be protected. I want my
         | private things in a volume with deniability. Trucrypt was
         | close.
        
         | gambiting wrote:
         | >>The dream I have is someone making a phone that is purpose-
         | built to be secure against state actors
         | 
         | I just don't see how anyone could build such a thing. State
         | level actors have the tools necessary to force you or your
         | company to build in any backdoor they want, and prevent you
         | from ever talking about it to anyone. US certainly does, and
         | could just force apple to add a backdoor to this lockdown mode
         | and apple could never even hint at its existence under legal
         | threat.
        
           | eurasiantiger wrote:
           | Or they could just add an implant at the factory.
           | 
           | Why anyone allows their devices to be manufactured overseas
           | is beyond me.
        
             | outside1234 wrote:
             | That's because you are unwilling to buy a $1500 phone when
             | there is the same phone for $800.
        
               | rblatz wrote:
               | Might want to update those prices. Highest priced iPhone
               | is $1,600.
        
             | qzx_pierri wrote:
             | >Why anyone allows their devices to be manufactured
             | overseas is beyond me
             | 
             | $$$$
        
             | Consultant32452 wrote:
             | We recently discovered one of our biggest geo-political
             | enemies manufactures all our medicines. So that's crazy.
        
             | robin_reala wrote:
             | Looking forwards to when Apple manufactures all iPhones in
             | Sweden. Or did you mean the US, which remains stubbornly
             | overseas and scary to the majority of the world's
             | population?
        
             | stjohnswarts wrote:
             | I don't recall getting a vote. Do you even know of a single
             | device made in a relatively "benevolent" state actor
             | country? I would love to know. I would love it if there was
             | a provably secure device manufactured in some remote
             | Pacific island that has never projected itself as a
             | malevolent international threat like 100% of the first
             | world countries have.
        
           | stjohnswarts wrote:
           | Not just the US, so do the EU, any five eyes country, China,
           | Korea, Taiwan. The US doesn't have a hegemony on backdoors so
           | lets always remember that and not exclude others or act like
           | it's an island of corruption in a world of benevolent state
           | actors.
        
             | Miraste wrote:
             | I don't think Korea or Australia have the power to force
             | Apple to build backdoors into their products. Maybe they'd
             | get to use the US one if they asked nicely.
        
               | buildbot wrote:
               | Unless it was some kind of false flag to encourage trust,
               | the US government asked less than nicely via the FBI and
               | Apple told them to pound sand.
        
         | googlryas wrote:
         | It might just be better to not rely on a phone, rather than
         | rely on something achieving perfect security against the most
         | malicious and capable of actors.
         | 
         | If I was really concerned about targeted cyber attacks against
         | me, I think that I would exclusively use computers that I would
         | buy from random people on Craigslist, take the hard drives out
         | and only boot with live CDs using ram disks, and only connect
         | via random public Wi-Fi locations.
        
           | reaperducer wrote:
           | _If I was really concerned about targeted cyber attacks
           | against me, I think that I would exclusively use computers
           | that I would buy from random people on Craigslist, take the
           | hard drives out and only boot with live CDs using ram disks,
           | and only connect via random public Wi-Fi locations._
           | 
           | Excellent precautions if you live and work in average middle-
           | class suburbia and never go anywhere or do anything
           | dangerous, controversial, or politically unpopular.
           | 
           | Lockdown Mode is not for you. It's for other people with
           | different lives.
        
             | googlryas wrote:
             | My point is lockdown mode won't be good enough. Which is
             | why there is still a big bounty for it. And those wouldn't
             | be excellent precautions if you weren't doing anything
             | dangerous, because they would be a huge burden over just
             | operating normally above board.
             | 
             | How exactly does this method stop working in cities? You
             | could have provided some content instead of a weirdly
             | vitriolic dismissal.
        
               | IncRnd wrote:
               | The parent was simply explaining that lockdown is not
               | intended for a person who buys computers from Craigslist
               | in order to enforce security.
               | 
               | Your mitigation is not a mitigation against being singly
               | targeted. There are so many attack vectors in a computer
               | outside of the boot disk. The computers sold on
               | Craigslist should not be considered secure, since there
               | is no level of trust in the supply chain or the state of
               | the hardware.
               | 
               | For ex: If you are being directly targeted, a nation-
               | state can purchase the computers from your local
               | Craigslist, rewrite their bios, and list them for you to
               | purchase. Then flood Craigslist with 100 other
               | compromised machines.
        
               | googlryas wrote:
               | Sure, they can do that. If they know that what you're
               | actually doing. And you just do the same thing stupidly
               | on repeat in the same area.
               | 
               | All of that certainly sounds much more involved than
               | sending a zero-day zero-click iMessage to the well known
               | phone number of a dissident.
        
           | Analemma_ wrote:
           | This is a fantasy that could only from someone who doesn't
           | actually need it. The people who actually need Lockdown
           | Mode-- dissidents, organizers, journalists, etc.-- also
           | actually need to communicate with normal people, and that
           | means having a phone. If you're so unimportant that you can
           | get away with your proposed computing scheme, you're not
           | going to be the recipient of targeted cyber-attacks.
        
             | googlryas wrote:
             | Well, I don't need it, but the people who do need it
             | usually don't have much of a clue about infosec or cyber
             | security.
             | 
             | What means of communication are available to you via a
             | phone but not via an internet connected computer?
             | 
             | There isn't even anything intrinsically wrong with a cell
             | phone, other than the fact that it encourages you to carry
             | it everywhere and merge all communications with everyone
             | onto a single device that is default connected to the
             | internet.
        
       | wmf wrote:
       | Defense in depth is good. Apple is finally getting over their
       | faith in their sandbox.
        
       | stephc_int13 wrote:
       | Computer security is notoriously difficult, but at the same time,
       | none of this is magical, this is meticulous hard work, and with
       | enough time, skills and money I don't see how you can't plug all
       | the holes.
       | 
       | At least the remote attack surface does not seem to be that
       | huge...
        
       | post_break wrote:
       | When reading through this list at each feature I can't help but
       | go "why isn't this in regular iOS?"
        
         | joshstrange wrote:
         | Which is exactly why it's optional. Plenty of other people,
         | myself included, look at that list and would not want them all
         | or would like to pick and choose which subsets are locked down.
        
           | post_break wrote:
           | Yeah pick and choose makes sense for sure. Apple isn't
           | exactly the king of choice unfortunately.
        
           | olyjohn wrote:
           | They should give you a list and the toggle should give you
           | the option "SECURE" or "INSECURE" because that's basically
           | what this is.
        
             | nojito wrote:
             | Hardened devices only work if it's an all or nothing
             | proposition.
        
       | [deleted]
        
       | [deleted]
        
       | tristor wrote:
       | This feature is really fantastic, and it re-affirms my commitment
       | to using Apple devices due to security in preference over
       | Android. The only thing I could see that would be a superior
       | alternative could perhaps be something like Graphene. Already
       | today I locally set up a profile via Configurator in order to
       | ensure that my phone can't be hijacked by some local attacks, the
       | work that is happening Lockdown is even better and I'll be
       | enabling this as soon as it becomes available to me.
        
       | Terretta wrote:
       | This is great, but also clever.
       | 
       | By offering users a more locked down option with clear tradeoffs,
       | (a) users can make a choice between security and convenience, and
       | (b) given user agency, negative press around hacks of _not_
       | locked-down devices loses potency.
       | 
       | Meanwhile, the choice seems straightforward on most of these...
       | 
       |  _Lockdown Mode includes the following protections:_
       | 
       |  _- Messages: Most message attachment types other than images are
       | blocked. Some features, like link previews, are disabled._
       | 
       | GREAT!
       | 
       |  _- Web browsing: Certain complex web technologies, like just-in-
       | time (JIT) JavaScript compilation, are disabled unless the user
       | excludes a trusted site from Lockdown Mode._
       | 
       | GREAT!
       | 
       |  _- Apple services: Incoming invitations and service requests,
       | including FaceTime calls, are blocked if the user has not
       | previously sent the initiator a call or request._
       | 
       | GREAT!
       | 
       |  _- Wired connections with a computer or accessory are blocked
       | when iPhone is locked._
       | 
       | GREAT! (Used to have to do this yourself with Configurator if you
       | wanted to be hostile border-crossing proof.)
       | 
       |  _- Configuration profiles cannot be installed, and the device
       | cannot enroll into mobile device management (MDM), while Lockdown
       | Mode is turned on._
       | 
       | HMM ... there are hardening settings only available through
       | Configurator or MDM profiles. Will those be defaulted on as well?
        
         | Infernal wrote:
         | >> - Configuration profiles cannot be installed, and the device
         | cannot enroll into mobile device management (MDM), while
         | Lockdown Mode is turned on.
         | 
         | > HMM ... there are hardening settings only available through
         | Configurator or MDM profiles. Will those be defaulted on as
         | well?
         | 
         | Reading between the lines here - on lockdown mode, you can't
         | install a profile, or enroll in MDM. What it doesn't say, is
         | that you _can 't_ enable lockdown mode with a profile
         | installed, or if enrolled in MDM.
         | 
         | I take this to mean, with lockdown turned on, I can't install
         | profiles or enroll in MDM (but presumably could uninstall
         | profiles or unenroll from MDM).
        
           | sodality2 wrote:
           | Correct. Existing MDM profiles will be unaffected.
        
         | xoa wrote:
         | > _- Configuration profiles cannot be installed, and the device
         | cannot enroll into mobile device management (MDM), while
         | Lockdown Mode is turned on._
         | 
         | > _HMM ... there are hardening settings only available through
         | Configurator or MDM profiles. Will those be defaulted on as
         | well?_
         | 
         | Yes, that one leapt out at me as well as kind of an awkward one
         | with more compromises, painting with a very broad brush. It's
         | obvious that some of the very powerful config profiles/MDM
         | capabilities could be used for a lot of mischief, but some of
         | them are also exactly what I'd want to be running myself if I
         | was at a lot of risk, and some are both. Ie., continuing to
         | have one's own offline based CA with proper Name Constraints
         | could be handy for a group of people who want to try to better
         | secure and keep private their own internal network services
         | from anything short of a government physical assault, but if an
         | attacker can slip on a profile with an unlimited CA your goose
         | is cooked.
         | 
         | Perhaps Apple simply doesn't have the capability for fine
         | grained control of those capabilities yet, which wouldn't be
         | surprising given their path up until now. I'll be interested to
         | see if over time Apple leaves this mostly untouched or invests
         | in seriously improving it. Like it'd be interesting if you
         | could boot into a special mode ala DFU though requiring
         | password and with graphics up and have a bunch of toggles for
         | various capabilities that would then be enforced in normal
         | usage. Analogous to the Recovery Mode on Macs.
        
           | alwillis wrote:
           | _Perhaps Apple simply doesn 't have the capability for fine
           | grained control of those capabilities yet, which wouldn't be
           | surprising given their path up until now._
           | 
           | I have to believe they're working on exposing some of this
           | via MDM. Certain organizations may never want the JIT turned
           | on, for example or allow attachments in iMessage.
           | 
           | I expect we'll hear more about more capabilities this summer
           | and fall.
        
             | m0dest wrote:
             | Do you really trust your average IT department to make an
             | informed decision about whether WebKit JIT is currently
             | secure or not? I don't see Apple putting these in MDM
             | Configuration Profiles. If they do, it will only be for
             | Supervised Devices (i.e. devices owned by your employer,
             | must be wiped to enroll).
        
               | alwillis wrote:
               | _Do you really trust your average IT department to make
               | an informed decision about whether WebKit JIT is
               | currently secure or not?_
               | 
               | In general, no.
               | 
               | For specific website or web apps, yes.
        
           | sodality2 wrote:
           | You can simply enable those MDM profiles then enable Lockdown
           | mode; they will stay on. You just can't enable new ones while
           | Lockdown mode is enabled.
        
       | Animats wrote:
       | Does lockdown mode prevent updates from Apple?
        
       | lisper wrote:
       | Extreme? This sounds like the way I have my computing environment
       | configured by default (to the extent that I'm able to do so with
       | browser extensions and whatnot).
        
         | ArrayBoundCheck wrote:
         | Same. Its too bad general browsing is nearly unusable with JS
         | turned off.
        
       | fbanon wrote:
       | >Web browsing: Certain complex web technologies, like just-in-
       | time (JIT) JavaScript compilation, are disabled unless the user
       | excludes a trusted site from Lockdown Mode.
       | 
       | This should be ON by default. It would force webdevs to write
       | efficient websites.
        
         | iasay wrote:
         | They'd just work out how to write web apps entirely in CSS
         | instead somehow.
        
       | m463 wrote:
       | If I could just firewall my phone like Little Snitch.
       | 
       | But apple doesn't allow this.
        
         | ignoramous wrote:
         | Firewalls like Little Snitch may not be enough against actors
         | like NSO (that exploit unknown zero-days), tbh. The mechanisms
         | to enhance protection does need to come from the vendor
         | (Apple). This _lockdown mode_ , for all its present
         | shortcomings, is moving the needle in the right direction, imo.
        
       | colechristensen wrote:
       | Can I turn these features on one by one by some other method?
       | (self-managed MDM, or something else?)
        
         | jackson1442 wrote:
         | Self-managed MDM is the way to go for most of them. I think the
         | main one that can't be achieved thru MDM is the browser
         | lockdown. MDM has a lot of other security policies available
         | though.
        
       | corytheboyd wrote:
       | If Apple could somehow make phone and sms not useless due to spam
       | that'd really save the average person. They must have the
       | resources to throw at something like this. I'm not claiming to be
       | an expert, I'm not saying I'm right, but phone spam is fucking
       | awful.
        
         | thothamon wrote:
         | Phone spam as in text messages? Your email is a whole other
         | thing
        
           | corytheboyd wrote:
           | Yes indeed email is a whole other thing, that's why I didn't
           | mention it :)
        
         | duskwuff wrote:
         | > If Apple could somehow make phone and sms not useless due to
         | spam
         | 
         | 1) A full solution to this problem is going to depend on mobile
         | carriers making changes. It isn't something which Apple can
         | unilaterally fix.
         | 
         | 2) This is completely irrelevant to the purpose of "Lockdown
         | Mode". It's intended to protect high-risk users from certain
         | sophisticated threats -- it isn't a feature which most users
         | should use.
        
         | knodi wrote:
         | they do already do this, report the message as junk the number
         | will be flagged as junk and messages from it will be filtered
         | to the junk view.
        
         | ipsi wrote:
         | Surely that's the responsibility of the providers, though?
         | Apple can improve the situation a bit, maybe, but you'd really
         | need to get AT&T & co to crack down on it to have any chance of
         | solving it for good.
         | 
         | I know that I've had approximately zero spam on my German
         | number (that I've had for ~2.5 years) - I'm sure why, whether
         | I'm just lucky, or whether it's much more under control here.
         | My UK number definitely had problems with spam, though. Maybe a
         | couple of spam calls a week.
        
           | corytheboyd wrote:
           | Nice, glad to hear it's at least reasonable elsewhere, It's
           | very, very bad in the US, at least for my partner and I. We
           | started getting unsolicited calls days after starting the
           | house buying process because the credit reporting companies
           | sell you off immediately. Very frustrating.
        
             | vorpalhex wrote:
             | There are several redirection services that will pair your
             | spam caller to a very chatty chatbot. Excellent way to make
             | spammers pay.
        
         | thedougd wrote:
         | Worst part of switching from Android (Pixel) to iPhone. It was
         | shocking.
        
         | jeroenhd wrote:
         | This seems to be a problem mostly localized to some countries.
         | Device manufacturers should not be fighting a rotten network,
         | the networks should be fixed instead.
        
           | corytheboyd wrote:
           | Yeah but... here we are. In the US at least, I don't see this
           | ever being addressed at the root. Everything between the user
           | and the phone service is at least somewhat malleable, what's
           | the problem with at least trying in one of those places?
        
       | newaccount2021 wrote:
        
       | janandonly wrote:
       | If Apple was really serious about this, they would add one more
       | feature to Lockdown mode: To delete and scrub permanently and
       | definitively _all your iCloud data_.
       | 
       | You can close the proverbially "front door" by enabling "Lockdown
       | mode" but if that same government sends a subpoena to Apple, then
       | they will just give them a copy of all your iCloud private data.
        
         | devnulll wrote:
         | Nobody who is at risk for this is doing iCloud backups. That's
         | something you can already turn off.
        
           | sneak wrote:
           | Their conversation partners are. iCloud Backup is a backdoor
           | in iMessage's end to end encryption preserved explicitly at
           | the behest of the FBI.
        
             | sonofhans wrote:
             | I'd love to see evidence of this.
        
               | modeless wrote:
               | "For Messages in iCloud, if you have iCloud Backup turned
               | on, your backup includes a copy of the key protecting
               | your messages"
               | 
               | https://support.apple.com/en-us/HT202303
               | 
               | Yes, that really does mean that Apple can decrypt your
               | messages. In fact, Apple does it this way at the explicit
               | request of the FBI, as reported by Reuters.
               | https://www.reuters.com/article/us-apple-fbi-icloud-
               | exclusiv...
               | 
               | And look at all the other potentially sensitive data that
               | is not end-to-end encrypted in the backups. Photos,
               | notes, reminders, calendars, the list goes on.
        
               | sodality2 wrote:
               | It's not something that has evidence - what they mean is
               | that even if you have iCloud backups disabled, everyone
               | you talk to might not. The point of e2ee is that both
               | ends must have it encrypted - not just you and the
               | server, but more abstractly, the communication partners.
        
               | warkdarrior wrote:
               | That is a novel and quite broad interpretation of E2EE.
               | In typical E2EE only endpoints of a (logical)
               | communication channel can decrypt messages on that
               | channel. But E2EE does not say anything about what an
               | endpoint can do with those messages once they decrypted
               | them -- they could print them at the public library and
               | leave them there, they can forward them to the FBI, they
               | can post them on reddit, etc.
               | 
               | If you do not trust your communication partner to
               | safeguard your messages, E2EE will not help you at all.
        
               | concinds wrote:
               | The point is that many people have iCloud Backups enabled
               | without any awareness whatsoever of the implications, as
               | iCloud Backups are opt-out and there is zero disclosure
               | within the OS (only an Apple Support webpage nobody will
               | visit).
               | 
               | It leads to E2E being systemically weakened, since most
               | of your iMessage conversations will get immediately
               | scooped up by Apple and alpbabet agencies, dragnet-style.
        
               | sodality2 wrote:
               | I understand that, I didn't mean the concept of e2ee
               | requires the endpoints to never share it at all. What I
               | meant was, commonly people will disable iCloud backups
               | hoping to regain some privacy, but it does nothing
               | because most of your communication partners use iCloud
               | backups. Just like people who switch to eg. Protonmail -
               | if you only ever talk to GMail users, it doesn't really
               | give you much extra privacy.
        
               | apeace wrote:
               | GP is partially right:
               | 
               | https://www.reuters.com/article/us-apple-fbi-icloud-
               | exclusiv...
               | 
               | According to Reuters sources, Apple abandoned plans to
               | offer iCloud backup encryption, out of fear of government
               | retaliation or even spawning new anti-encryption
               | legislation.
               | 
               | On the other hand, GP is responding to:
               | 
               | > Nobody who is at risk for this is doing iCloud backups.
               | That's something you can already turn off.
               | 
               | And indeed, if you turn off iCloud backups, there is no
               | "backdoor" into iMessage. You can also set up your phone
               | to do encrypted backups locally to your laptop, if you
               | want that instead.
        
         | stu2b50 wrote:
         | You can already turn off iCloud features?
        
         | threeseed wrote:
         | If you care about your privacy don't upload your private data
         | to ANY cloud service.
         | 
         | Even if iCloud was encrypted they still run on third party
         | cloud providers who nobody knows what relationship they have
         | with governments. Many types of encryption are breakable if you
         | have effectively unlimited resources.
        
         | luhn wrote:
         | Most iCloud data is end-to-end encrypted; Apple doesn't have
         | direct access to your data. In the end they do own the OS and
         | could potentially backdoor your device, but if you're worried
         | about that... well, Lockdown Mode is moot at that point.
         | 
         | Worth noting Apple previously refused an FBI order to do just
         | that. https://en.wikipedia.org/wiki/FBI-
         | Apple_encryption_dispute
        
           | jackvalentine wrote:
           | > Most iCloud data is end-to-end encrypted; Apple doesn't
           | have direct access to your data.
           | 
           | Depends what you think of as 'most' really, things that don't
           | have end-to-end includes photos, icloud drive files, notes
           | and backups.
           | 
           | https://support.apple.com/en-us/HT202303
        
             | mytherin wrote:
             | Secure notes are end to end encrypted [1]
             | 
             | [1] https://support.apple.com/en-
             | gb/guide/security/sec1782bcab1/...
        
           | modeless wrote:
           | Apple refused an FBI order to decrypt a phone; however they
           | allow the FBI to access iCloud data all the time. And
           | iMessage is not end-to-end encrypted in iCloud _at the
           | explicit request of the FBI_.
           | https://www.reuters.com/article/us-apple-fbi-icloud-
           | exclusiv...
        
             | nojito wrote:
             | Yes but many things on iCloud are E2E encrypted.
             | 
             | https://support.apple.com/en-us/HT202303
        
               | modeless wrote:
               | Which makes it all the more ridiculous that sensitive
               | things like messages, photos, contacts, and notes aren't,
               | even as an option. Clearly the technical ability is
               | there.
        
       | 2OEH8eoCRo0 wrote:
       | > Wired connections with a computer or accessory are blocked when
       | iPhone is locked.
       | 
       | Android defaults to charging only.
        
         | Aaronn wrote:
         | The same is true on iOS
         | (https://www.theverge.com/2018/7/10/17550316/apple-iphone-
         | usb...). Lockdown mode just prevents you from enabling it.
        
           | 2OEH8eoCRo0 wrote:
           | > USB Restricted Mode prevents USB accessories that plug into
           | the Lightning port from making data connections with an
           | iPhone, iPad, or iPod Touch if your iOS device has been
           | locked for over an hour.
           | 
           | Android asks every time for every device. There is no 1-hour
           | grace period.
        
       | TIPSIO wrote:
       | If you are "a target" and going to take measures of basically
       | disabling everything on your iPhone, wouldn't it just make sense
       | to get a burner dumb phone?
       | 
       | Hasn't this been happening for years (drug dealers, anonymous,
       | etc..)?
        
         | stu2b50 wrote:
         | Think more about journalist. You need slack to talk to the rest
         | of the team. You need WhatsApp to communicate with sources and
         | locals in most of the world that's not the US. Your iPhone is
         | an important tool for your work in general - a dumb phone that
         | can only make real phone calls and sms is not particularly
         | close.
         | 
         | Phone calls and sms are also completely unprotected as opposed
         | to chat apps with e2e.
        
         | pizlonator wrote:
         | But then you'll want lockdown mode (or something like it) on
         | whatever device you use to browse the web.
        
         | yreg wrote:
         | What then? Use SMS?
        
       | [deleted]
        
       | alwillis wrote:
       | Let's not let the perfect be the enemy of the good.
       | 
       | This is a _huge_ step forward for iPhone users. Look, I get it.
       | From the typical HN perspective, this potentially looks like a
       | lot of hype. But many of you aren 't looking at from a high
       | level.
       | 
       | In the world we are now living in; even what's happening in the
       | United States right now, being able to protect yourself from
       | well-funded, determined attackers for the average person couldn't
       | come at a better time.
       | 
       | There's a huge gap between Fortune 500 executives, government
       | officials, etc. and regular people in terms of the resources
       | available to them to prevent state-sponsored attackers. It
       | doesn't take much these days to go from a nobody to being on
       | somebody's radar.
       | 
       | If you're a woman seeking an abortion in a state where it's
       | illegal or severely restricted, you could be the target of
       | malware from your local or state government or law enforcement.
       | In Texas, you can sue anyone who aids and abets a woman who
       | attempts to get an abortion for $10,000, which is enough to get
       | someone to trick someone into installing malware on a phone.
       | 
       | No, it's not China or Russia coming for you but it doesn't take
       | much to ruin someone's life.
       | 
       | I don't think this is virtue signaling or marketing hype by
       | Apple; if anything, this is right in alignment with the stance
       | they've had on privacy for years. Even for a company the size of
       | Apple, putting up $10 million to fund organizations that
       | investigate, expose, and prevent highly targeted cyberattacks
       | isn't pocket change.
       | 
       | At the end of the day, this is all good news for user privacy and
       | security going forward. I also suspect if I lockdown my iPhone,
       | my other compatible devices using the same Apple ID will also
       | lockdown. No IT department required.
        
         | Sebb767 wrote:
         | > There's a huge gap between Fortune 500 executives, government
         | officials, etc. and regular people in terms of the resources
         | available to them to prevent state-sponsored attackers. It
         | doesn't take much these days to go from a nobody to being on
         | somebody's radar.
         | 
         | It's also a question of whether you want that. Anyone can take
         | anti-phishing training, it just takes a lot of time. Want to
         | download a mod for a game? You better have a separate gaming
         | machine with _no_ important data on it and, to be sure, in a
         | separate network. Want to buy a phone? Better drive to a random
         | store, ordering is to dangerous.
         | 
         | Sure, it's easy to get on the radar, but avoiding a state-
         | sponsored hack is also a lot of effort. Fortune 500 executives
         | need to put that effort in and they do have the money to make
         | it happen, but for most people, the problem is not the cost.
        
         | rmbyrro wrote:
         | > putting up $10 million isn't pocket change
         | 
         | 10 Million = 0.0027% of Apple's sales in 2021.
         | 
         | Equivalent to an Apple developer who made 300K in 2021 donating
         | 8 dollars.
         | 
         | If this doesn't classify as pocket change, it's quite close.
        
           | tyingq wrote:
           | Enlightening comparison, though revenue isn't income.
           | 
           | If you went with net income, it would be 0.0105% of Apple's
           | 2021 net income.
           | 
           | Or $31.80 of $300k instead of $8.
        
             | rmbyrro wrote:
             | $300k is not the developer net income, in the example
        
           | fastball wrote:
           | Apple has a lot of other stuff to spend money on. Pocket
           | change adds up.
        
           | samatman wrote:
           | Apple made 25 billion _in profit_ in 2021, so the equivalent
           | of a 300K income donating $1200 dollars.
           | 
           | To stave off tedium, it's still $800 at a 1/3rd tax rate.
           | These numbers aren't pocket change any way you slice it.
        
         | jorvi wrote:
         | I agree with the rest of your comment, but this
         | 
         | > Even for a company the size of Apple, putting up $10 million
         | to fund organizations that investigate, expose, and prevent
         | highly targeted cyberattacks isn't pocket change.
         | 
         | is kind of funny, as it's about 1/20000 of their total _cash_
         | reserves. With 20000 in my savings account, it'd be equivalent
         | to giving 1 dollar to charity. In other words, pocket change :)
        
           | PoignardAzur wrote:
           | It's still ridiculously good by bug bounty standards.
           | 
           | Zero-day buyers are going to have a hard time topping that.
        
             | O__________O wrote:
             | Bounty is $2 million, grant is $10 million.
             | 
             | You could easily get more for selling a zero-day likely
             | this than reporting it to Apple. If you combined the risk
             | this is being turned on is reported back to Apple or
             | remotely detectable, combined with a zero day, it would be
             | a goldmine; cover this and other issues in my comments on
             | the topic:
             | 
             | https://news.ycombinator.com/item?id=32006436
        
           | jjtheblunt wrote:
           | where are the cash reserves documented?
        
             | zie wrote:
             | see: https://investor.apple.com/investor-
             | relations/default.aspx
             | 
             | Specifically the 2022 Q2 financial statement(it's a PDF).
             | under "Cash and Cash equivalents" on the 2nd page, you will
             | see: 28,098
             | 
             | That's in millions of dollars(see top of that page for
             | source), so they have 28 Billion USD just laying around.
             | 
             | 10M/28098M = 0.0004 so it's 0.04% of their cash.
        
         | kelnos wrote:
         | I have mixed feelings about this.
         | 
         | Lockdown Mode basically cripples the phone, feature-wise. It's
         | not quite to the point where I'd (even hyperbolically) say "why
         | don't you just get an old dumb phone instead", but still...
         | 
         | The right thing to do would be to redesign the system from the
         | bottom up to actually be secure in the face of vulnerabilities
         | in any of these features that get disabled because they can be
         | dangerous for people. (And maybe Apple is working on this
         | behind the scenes, which will take them years to complete.)
         | 
         | But, agreed: let's not let perfect be the enemy of the good.
         | It's better to have this option than to not have it, even
         | though it likely creates a super restricted user experience
         | that probably isn't particularly pleasant to use.
        
           | Syonyk wrote:
           | > _Lockdown Mode basically cripples the phone, feature-wise.
           | It 's not quite to the point where I'd (even hyperbolically)
           | say "why don't you just get an old dumb phone instead", but
           | still..._
           | 
           | The problem is that phones (of the "dumb"/"feature" variety)
           | are running OSes that don't have nearly the security
           | attention or hardware features related to them as iOS
           | devices.
           | 
           | I carry a KaiOS feature phone as my personal phone (when I
           | remember it). Apple pissed me off enough with the CSAM stuff
           | that I wanted to experiment with alternatives, and I've done
           | so. However, I don't pretend KaiOS is particular "hard"
           | against attackers - it's almost certainly not. But neither
           | does it have much of an attack surface. It doesn't even try
           | to render emoji, they're just black rectangles. And neither
           | does it try to, say, render weird old Xerox image formats.
           | 
           | I would trust an iOS device with "most of the complex attack
           | surfaces turned off" far more than I'd trust a KaiOS or
           | stripped Android device. You get all the hardware
           | protections, regular OS updates, a bug bounty program focused
           | on this mode, and the smaller attack surface window of
           | Lockdown.
           | 
           | I'm incredibly excited by it, because it turns off all the
           | stuff _I don 't want in a phone anyway._
           | 
           | Unfortunately, "crickets on CSAM" is a problem too. If they
           | say they're not going to ship that ill conceived feature, I
           | might move back to iOS. If not, well... I'll probably play
           | with Lockdown mode for a week or two and then go back to the
           | Flip.
        
         | samstave wrote:
         | CYBER-FUCKING-PUNK has entered the chat!
         | 
         | ---
         | 
         | >> _There 's a huge gap between Fortune 500 executives,
         | government officials, etc. and regular people in terms of the
         | resources available to them to prevent state-sponsored
         | attackers._
         | 
         | - Full Stop.
         | 
         | -----
         | 
         | The fact is ; UNLESS you are either the .% or the other ...% of
         | HN users/hackers/dark-web 'rippers' ; you are cyberly _FUCKED_
         | 
         | And its super odd that we have ~~Ono-Sendai~~ APPL 'defending'
         | cyber-rights.
         | 
         | --
         | 
         | How the fuck can one downvote the above and not have a valid
         | reason they'd lik to share. We are on H-FN-N... you think we
         | don't know the above is true?
        
         | smoldesu wrote:
         | > If you're a woman seeking an abortion in a state where it's
         | illegal or severely restricted, you could be the target of
         | malware from your local or state government or law enforcement.
         | 
         | Let's not get in above our heads, here: if the US government
         | wants to know what's on your iPhone, they still have the
         | faculties to retrieve that information. Setting your iPhone in
         | a lockdown mode isn't going to let you escape the purview of
         | government surveillance, and if it did then Apple wouldn't be
         | announcing it today. We're _all_ targets of government malware,
         | and the way they ensure we all keep it installed is simple:
         | they just make Apple and Google write it for them. This
         | pervasive idea that Apple is somehow escaping the jurisdiction
         | of PRISM is pretty hysterical, and it makes me excited for the
         | first Senators to get caught paying for prostitution services
         | with Apple Pay inside Lockdown Mode. The only enemy of  "good"
         | in a threat model is the unknown, and Apple makes sure there's
         | _plenty_ of unknown factors in your iPhone.
         | 
         | Edit: For all HN loves to rant about the Halloween Documents,
         | you lot seem awfully unfamiliar with the Snowden leaks...
        
         | andrewmcwatters wrote:
         | "Silly HN reader, you're just not seeing the big picture."
         | Could you not?
         | 
         | You know what people do when they're targeted by state actors?
         | They don't use computers. And if they have to, they air gap.
        
           | MBCook wrote:
           | Ok. You're in the Republic of Somethingistan. You're alone.
           | All you have is your phone to contact people at home to help
           | you and some money and you need to get out.
           | 
           | You know the state is after you.
           | 
           | So you ignore this, turn off your phone instead, and... what?
           | Now you're even more alone, can't get help from
           | friends/family.
           | 
           | This seems like a very reasonable option in some situations.
        
           | dangus wrote:
           | It seems like there could be a median area between "in the
           | crosshairs of the KGB" and "I need to avoid off-the-shelf
           | exploits in a specific situation."
           | 
           | A great example of this might be visiting a country like
           | China while on business. Straight up going "off the grid"
           | isn't really an option in that scenario.
        
           | PoignardAzur wrote:
           | > _You know what people do when they 're targeted by state
           | actors? They don't use computers. And if they have to, they
           | air gap._
           | 
           | That's like saying "men who don't have easy access to condoms
           | just stay abstinent instead". This is what we _wish_ would
           | happen. But empirically, they just shrug and do the insecure
           | thing.
           | 
           | (There was an article posted on HN a few years ago that was
           | from a journalist pointing out this exact thing, from his
           | personal experience. I can't find it though.)
        
           | wnevets wrote:
           | Someone better let those NGOs hacked by china know right
           | away!
        
           | astrange wrote:
           | It's true, NSO Group doesn't exist and none of their exploits
           | have ever worked on anyone.
        
         | dkarl wrote:
         | > In Texas, you can sue anyone who aids and abets a woman who
         | attempts to get an abortion for $10,000, which is enough to get
         | someone to trick someone into installing malware on a phone.
         | 
         | Anecdata for people who think this is unlikely: my wife had an
         | issue getting unclaimed property back from the state of Texas
         | and hired someone who advertise the ability to help. She turned
         | out to be a bulldog with a ton of knowledge of the necessary
         | bureaucracy. She put hours per week into it on our behalf for
         | months, through many rounds of filing paperwork and then
         | hounding bureaucrats on the phone by telling them exactly how
         | and why we could sue if they ignored it. She did all that for a
         | cut that was a fraction of the $10k abortion bounty. The $10k
         | might seem like a symbolic gesture, but it will spawn a cottage
         | industry of bounty hunters. No doubt most of them will be
         | ideologically excited wannabes who quickly give it up, but some
         | will be dogged and effective and will cultivate an expanding
         | repertoire of skills. It's a terrifying prospect.
         | 
         | There will be many, many people who never previously
         | entertained the idea of getting involved in serious criminality
         | who now need protection from the prying eyes of the state and
         | their fellow citizens. To look at it from a cold and
         | opportunistic viewpoint, this could change the public
         | perception of digital privacy from being just for dangerous
         | creepy people to something that everybody should value.
        
           | cirgue wrote:
           | To add to this: the whole point of the civil right to action
           | is so that anti-abortion groups can target individuals in
           | order to create precedent-setting cases. This is a mechanism
           | that is designed to be used by well-funded groups. The threat
           | model here isn't some rando deciding they want to sue you,
           | it's a team of determined lawyers that absolutely will take
           | your case as far as they possibly can.
        
           | greiskul wrote:
           | I hadn't thought about this, but you are right. Hell, they
           | don't necessarily even have to be immediately targeted
           | attacks bounty hunters. Try to perform attacks in mass to
           | read personal messages/e-mails of people, use filtering to
           | try to find messages of people discussing getting abortions,
           | and then parallel construct a innocent sounding story to use
           | in court. With 10k per success, you really don't need that
           | many hits to start making big money.
        
           | nextos wrote:
           | Also, I personally know many old people who use a device just
           | for managing their finances as they are inexperienced with
           | security and fear their main device might get hacked.
           | 
           | This functionality makes a lot of sense in such a case.
        
           | fastball wrote:
           | Yeah except putting malware on someone's phone is actually
           | illegal, so seems like a pretty bad tradeoff since, ya know,
           | you'd have to mention how you got the data when you sue
           | someone in court.
        
             | kelnos wrote:
             | Police use this sort of tactic (parallel construction) all
             | the time, though: they collect evidence in ways not
             | admissible in court, but use knowledge of that evidence to
             | find new lines of investigation and new evidence that _can_
             | be admissible in court.
             | 
             | Presumably someone could use malware on someone's phone to
             | know who to target with an abortion-related lawsuit, and
             | then use legal forms of investigation to find evidence to
             | prove that they got an abortion.
        
             | BHSPitMonkey wrote:
             | https://en.wikipedia.org/wiki/Parallel_construction
        
             | Angostura wrote:
             | Getting information through an illegal trawl, is an
             | amazingly effective way of working out how to get related
             | information "legally".
             | 
             | Find out from the phone, that they have an appointment at a
             | particular time and place? It's easy to just be there and
             | photograph them, "as part of occasional surveilance" or
             | whatever.
        
         | hk1337 wrote:
         | I kind of want to turn it on and leave it on. I'm assuming
         | since it's a "mode" that I can turn it off when I need to, do
         | what I know is legit, then turn back on again.
        
           | rmbyrro wrote:
           | Might not be as convenient. Probably requires restarting the
           | phone.
        
             | QuantumSeed wrote:
             | As soon as you enable lockdown mode in iOS 16 Beta 3 it
             | reboots the phone
        
           | kelnos wrote:
           | I would assume that disabling Lockdown Mode means wiping the
           | phone to factory condition. Otherwise Lockdown Mode is only
           | as secure as whatever PIN or password you use to disable it,
           | which isn't particularly secure at all.
        
             | Syonyk wrote:
             | Yes, but if an attacker has physical access and unlimited
             | time, you've probably lost anyway.
             | 
             | What this seems to be focused on are the "remote zero-
             | click/one-click" vulnerabilities we've seen, in which
             | either a message is delivered that never shows up but
             | installs a backdoor hook, or a website can deliver a
             | malware package to a particular user and install the
             | backdoor hook without notifications.
             | 
             | It sounds like it does improve some of the physical
             | security features, which should help reduce attack surface,
             | but I wouldn't trust _any_ bit of consumer electronics
             | against a sustained physical attack by a sufficiently
             | motivated adversary.
        
         | Veserv wrote:
         | Let's not let better be the enemy of good either. Better than
         | terrible is still bad and is nowhere near good.
         | 
         | It is frankly ridiculous that anybody should believe Apple when
         | they claim to provide even minimal resistance to well-funded
         | determined attackers. Protecting against well-funded determined
         | attackers has been the holy grail of software security since
         | forever and everybody in software security at least claims to
         | be working toward that. Despite that, the prevailing state of
         | "best-in-class" "best-practices" commercial software security
         | is objectively terrible including Apple circa 1 year ago.
         | 
         | Are we supposed to believe that Apple, despite abject failure
         | over the last few decades until as recently as the last time
         | they announced security updates to the iPhone, has finally this
         | time, for sure, pinky swear its true, jumped from terrible to
         | the holy grail, or even good, because they said so?
         | 
         | No, this is absolute, utter, unequivocal garbage. Their claims
         | are completely unsupported and they should be excoriated for
         | spewing unsubstantiated bullshit that muddies the waters of the
         | actual state of software security and misleads people into
         | believing they are getting a meaningful degree of protection or
         | software security.
         | 
         | If they want to make such claims, they should put their money
         | where there mouth is and, instead of certifying iOS to EAL1+
         | and AVA_VAN.1 as they currently do, they should certify it in
         | "Lockdown Mode" to EAL6-7 and AVA_VAN.5 which actually does
         | certify protection against "high attack potential" attackers
         | such as large organized crime and state-sponsored attackers. At
         | the very least they could certify it to EAL5 and AVA_VAN.4
         | which certifies protection against "moderate attack potential"
         | attackers. Until they do that, their claims to protect against
         | state-sponsored attackers are complete unverifiable bullshit.
        
           | donw wrote:
           | Especially as Apple is often the "well-funded attacker".
        
         | O__________O wrote:
         | At the point it puts users at more risk that not, I don't see
         | this as a step forward; not informing users of the risk of
         | having iCloud enabled is one example.
         | 
         | For more of my take on the topic, see:
         | 
         | https://news.ycombinator.com/item?id=32006436
        
       | mcculley wrote:
       | This is great but too big of a hammer for most use cases. What I
       | really want is a per-application firewall.
       | 
       | For example, say I would like to install a photo editing
       | application. It would need access to my photos. That is fine, so
       | long as it is not allowed to connect to the Internet (or any
       | other network). There is currently no way to ensure this.
        
         | lolsal wrote:
         | > This is great but too big of a hammer for most use cases.
         | 
         | This is not in any way intended for most use-cases, it's very
         | clearly intended for a single, specific, uncommon use-case. The
         | press release says as much more than once.
        
           | mcculley wrote:
           | I guess my point is that instead of making a special mode
           | that is only useful for a minority of users, it would have
           | been really nice to get a feature that everybody should be
           | thinking about and using.
        
             | Legion wrote:
             | Perhaps that's what it eventually evolves into. Probably
             | easier to get this off the ground by developing it as a
             | separate mode.
        
         | briffle wrote:
         | I'd go a step further, and say per-application virtualization.
         | Every single program running its own (ideally encrypted memory)
         | namespace, with its own assigned memory, etc.
        
           | muricula wrote:
           | That's what the ios sandbox provides. Heck, the tools arm64
           | gives you to isolate VMs are awfully similar to the tools
           | they give you to isolate processes. VM escapes aren't too
           | different than sandbox escapes.
           | 
           | Encrypted memory isn't part of arm yet, I was holding out
           | hope with armv9 "realms" but not so.
        
         | varenc wrote:
         | Agreed. I wish iOS had a "network access" permissions just like
         | Android does. (Though to avoid permission fatigue for the
         | average user, perhaps make it something only users that care
         | can deny)
         | 
         | That said, I think this is pretty unrelated to protecting
         | yourself from nation state actors. Mercenary spyware (like NSO)
         | doesn't use a legitimate app store app as their initial
         | infection point. I can think of many reasons for this:
         | difficulty getting target to install it, app store approvals,
         | leaking their 0days, leaving more of a paper trail, and
         | avoiding scrutiny in general, etc. I'd of course love this
         | feature for my own data privacy of course.
        
           | mcculley wrote:
           | > (Though to avoid permission fatigue for the average user,
           | perhaps make it something only users that care can deny)
           | 
           | Yeah, I would not want to have to approve every app. What I
           | would like is a machine readable description of the app's
           | capabilities to include Internet access, just as is required
           | for access to the microphone or photos. This would encourage
           | app developers to advertise to users that they don't need
           | such capability and encourage users to realize that privacy
           | and Internet access are mutually exclusive.
           | 
           | There are many small apps I simply will not buy/install
           | (e.g., apps for editing photos or contacts or calendars)
           | because they cannot be trusted. Even if you trust the
           | developer, the developers are often embedding third party
           | analytics libraries that cannot be trusted.
        
             | astrange wrote:
             | This feature exists in Chinese iPhones because it's
             | required by law there.
        
         | olliej wrote:
         | Edit: apparently I was wrong here? Though I'd swear it had the
         | feature?
        
           | Nextgrid wrote:
           | You can disable app's cellular data access, but that's it, at
           | least on Western phones. Ironically, phones for the Chinese
           | market actually expand that setting and also allow to block
           | Wi-Fi access.
        
           | mcculley wrote:
           | Where do you see this in iOS? The Settings app has many
           | permissions for applications, but no "Internet" permission.
        
             | azinman2 wrote:
             | You can turn off cellular data access to an app; not quite
             | whole internet as this WiFi will still work. But it's half
             | the problem.
        
           | LeoPanthera wrote:
           | It does not ask for internet access, it asks for access to
           | other devices on the LAN. Not the same thing.
        
         | imdsm wrote:
         | I use little snitch for this, but I agree, a big hammer, and
         | likely more hoops for regular developers to jump through.
         | Notarisation, signing, forced developer keys...
        
           | post_break wrote:
           | Little Snitch is great. Apple would never allow it on iOS
           | which is ridiculous.
        
             | CharlesW wrote:
             | It's not the same, but have you used App Privacy Report to
             | monitor what your iOS apps are doing?
             | 
             | https://www.wired.com/story/ios-15-app-privacy-report/
        
               | mcculley wrote:
               | The App Privacy Report is great, but too late. It shows
               | you what an app did, not what it might do.
        
               | criddell wrote:
               | Thanks for posting this. I just turned it on and am
               | looking forward to the report.
               | 
               | It's under Settings > Privacy > App Privacy Report.
        
           | mcculley wrote:
           | I use Little Snitch on macOS, but it is not available on iOS,
           | so far as I know. Normal apps on iOS do not have enough
           | visibility into the system for that.
        
             | jeroenhd wrote:
             | Android exposes a soft VPN API that firewall apps can use
             | to block network traffic for certain apps in certain
             | scenarios (say, no Google Play updates when on mobile data)
             | with apps like Netguard [1].
             | 
             | Does iOS not expose such functionality? Surely there's some
             | kind of VPN API?
             | 
             | [1]: https://github.com/M66B/NetGuard
        
               | mathisonturing wrote:
               | Android has app system level options in the settings to
               | disable WiFi/mobile data.
               | 
               | I tend to use that, and use Netguard as a fallback
               | because the latter has an off by default config incase I
               | forget to disable it for new apps.
               | 
               | Netguard on its own is insufficient because sometimes
               | you'd need to use an actual VPN (which turns off
               | Netguard)
        
               | infthi wrote:
               | I've had those options on multiple OnePlus phones, but
               | they were not present on multiple Pixels. Since Pixels
               | are usually sold as "AOSP experience with Google flavor"
               | are lacking this feature - I am not sure if that is that
               | feature comes from AOSP or is only present on OnePlus
               | phones.
        
               | ignoramous wrote:
               | > _Android exposes a soft VPN API that firewall apps can
               | use to block network traffic for certain apps in certain
               | scenarios (say, no Google Play updates when on mobile
               | data) with apps like Netguard._
               | 
               | I worked on AOSP for longer than I care to admit. This is
               | mostly an illusion. System apps (like Google Play) can
               | pretty much do whatever the heck it is that they want to.
               | NetGuard, sure, "firewalls" it... but it wouldn't even
               | know if a system app bypassed its tunnel. For installed
               | apps, NetGuard is golden (as long as NetGuard itself
               | doesn't leak).
               | 
               | disclosure: I co-develop a FOSS NetGuard alternative (and
               | yes, this alternative has similar limitations).
        
               | mcculley wrote:
               | iOS has APIs for VPNs and "content blockers". But as far
               | as I know, such a filter has no access to know which
               | process/application is trying to make a connection.
               | Little Snitch on macOS has to install code into kernel
               | space. (Or at least it used to; I have not reinstalled in
               | a long time.)
               | 
               | The Android app you link to seems to have the
               | functionality I think should exist as a built-in. It
               | needs to be built-in so that non-geeks can use it.
               | 
               | Just as users are asked the first time an application
               | attempts to use the microphone and are able to prevent it
               | before it starts, they should be able to limit network
               | access and revoke it at any time.
               | 
               | (I don't think users should be necessarily be forced to
               | approve Internet access for every app install. Just make
               | it possible to revoke in the global Settings widget and
               | encourage users to think about personal data and Internet
               | access being mutually exclusive.)
        
               | FireBeyond wrote:
               | Not like that. The idea is antithetical to Apple, who
               | have said during keynotes that they've tried to avoid
               | doing so, because what they really want is a world where
               | the concept of "mobile data" is not limiting.
        
           | radicaldreamer wrote:
           | None of which is particularly effective since it's trivial to
           | setup a legal entities that makes one game but signs a bunch
           | of malware (or steal enterprise keys).
        
       | freedom-fries wrote:
       | I'm guessing it will run afoul of the EU regulations. At the bare
       | minimum there should be a way for level playfield - individual
       | applications and third party application providers should have
       | same access as Apple's apps!
       | 
       | * If Safari and Messages is allowed then all other apps should be
       | allowed and have complete access to the device even in the
       | lockdown mode. * If apple gets access to any traffic from the
       | device in the lockdown mode, then all other applications should
       | have full access to advertising metrics and device data as well.
       | 
       | At that point it's probably not much of a lockdown, but Apple
       | can't have all the fun can it?
        
       | clamprecht wrote:
       | They should offer "US President mode". Didn't Obama have to have
       | a special version of the Blackberry developed for him, while he
       | was president?
        
         | sedatk wrote:
         | Yeah, in which Twitter is also locked down.
        
       | drexlspivey wrote:
       | Does this offer any protection after you are already pwned? Is
       | the expectation that you have it permanently on if you are a high
       | value target or do you turn it on temporarily before clicking on
       | a link for example?
        
         | dustyharddrive wrote:
         | Don't know enough about iOS to say for sure about persistence,
         | but recent Pegasus (NSO Group spyware) versions don't
         | bother[1], instead repeatedly exploiting bugs starting with
         | "features" like background Messages attachment parsing.
         | 
         | Those are the kind of threats Lockdown Mode finally
         | acknowledges -- targets (well IMO everyone) would need it
         | permanently enabled.
         | 
         | Otherwise the temporary protection before clicking a link can
         | be had today in other ways, like disabling Settings > Safari >
         | Advanced > JavaScript.
         | 
         | [1] Lack of persistence likely an attempt at making it harder
         | to analyze:
         | https://www.amnesty.org/en/latest/research/2021/07/forensic-...
        
         | Nextgrid wrote:
         | If you're already pwned to the point where they have kernel-
         | level access and can bypass code signature enforcement, all
         | bets are off. Even if lockdown mode interfered with their
         | activity, at this point nothing prevents them from modifying
         | the Settings app to not really enable lockdown mode even if you
         | request it to.
        
         | olliej wrote:
         | If you have already been pwned, the OS is compromised so it
         | clearly is not able to retroactively undo that - any checkbox,
         | option or whatever can just be turned into a no op that lies.
        
         | olyjohn wrote:
         | If you're going to run a crippled-ass phone to protect
         | yourself, because the regular phone is so fucking insecure, why
         | even bother with a smartphone? They'll just find an exploit in
         | something that the "security mode" hasn't disabled.
        
       | einpoklum wrote:
       | Apple cannot even in theory protect you from spyware, because
       | Apple's OS and apps _are_ spyware - as Apple (routinely?
       | occasionally?) collects your personal data for the US
       | government's NSA and passes it to them (Snowden revelations:
       | https://www.theguardian.com/world/interactive/2013/nov/01/sn...)
        
         | Nextgrid wrote:
         | This might get downvoted but it's actually true. If you're
         | logged into iCloud, even with all features disabled, things
         | like your call history and email recipient history (regardless
         | of whether you're using iCloud Mail) are uploaded for example.
        
       | legalcorrection wrote:
       | I see they're running the reality distortion field at full power.
       | 
       | This is a load of bullshit and marketing hype. They are letting
       | you turn off features for security reasons, i.e. what basically
       | every OS has let you do, and what every half-competent IT
       | department has been doing, for decades. In fact, iOS was an
       | outlier in how unconfigurable it was, and with the pitiful MDM
       | options not letting you turn off many of these features that are
       | constant sources of vulnerabilities and social engineering.
       | 
       | Nothing that novel here other than the framing and cybersecurity
       | marketing bullshit about Nation State Actors and "mercenaries."
        
         | haswell wrote:
         | Of course Apple is going to put a marketing spin on everything
         | they do - that is a given. Does that somehow invalidate the
         | work itself?
         | 
         | Why do you find it necessary to reframe the introduction of
         | these features as a load of bullshit?
         | 
         | Are you arguing that these features are bad or not useful?
         | 
         | Or are you just saying that "it's about time"? And if so, why
         | not just focus on the part where Apple is doing a thing that
         | needed to be done?
         | 
         | The undertones in your comment feel a bit unnecessary.
        
           | legalcorrection wrote:
           | Because it's being made to sound like something it's not. The
           | comments are full of people fawning over how innovative and
           | groundbreaking this is. Just trying to offer a dose of bitter
           | reality to bring people back down to earth.
        
             | haswell wrote:
             | To what end? What new insight is gained from such a
             | reframing?
             | 
             | I personally don't think the individual features are as
             | interesting as the overall framing and the fact that Apple
             | is publicly announcing their intentions. The feature set
             | will doubtless change over time - such is the nature of any
             | software endeavor - but starting that journey is the
             | interesting part.
             | 
             | Getting stuck on "but it's just xyz dumb feature..." or
             | "but they should have done x long ago", etc. just obscure
             | the more interesting fact that they're explicitly embarking
             | on this path to begin with.
        
             | [deleted]
        
       | TheRealDunkirk wrote:
       | Sounds like a plan to make iOS the default for highly-placed
       | government employees. Maybe that's already the case, but I
       | thought I remembered that Obama had to have 2 phones, and the
       | "secure" one wasn't an iPhone. Anyone have any more knowledge
       | about this?
        
         | ceejayoz wrote:
         | The secure one was a BlackBerry for a while.
         | https://www.theverge.com/2016/6/11/11910306/obama-upgrades-f...
        
         | easton wrote:
         | I'm guessing it isn't, if only because this feature completely
         | disables MDM (which you'd need in government or business to do
         | things like remote wipes or passcode policies). It looks to be
         | designed for people that are possible targets to use on their
         | personal phone, which shouldn't have work data on it.
         | 
         | (Of course, they could make some new MDM policies to
         | individually turn these features on. You can already block
         | external devices with MDM, and you can completely disable
         | FaceTime/iMessage/iCloud. It wouldn't be much of a jump to add
         | the more granular protections this has.)
        
           | bad416f1f5a2 wrote:
           | I think you've misread this announcement: it doesn't appear
           | that MDM is disabled. It merely looks like you cannot change
           | MDM settings, including enrolling, while this feature is
           | active.
        
         | InitialLastName wrote:
         | At least at the start of the Obama Administration, he was known
         | to be hooked on his Blackberry [0], and I know RIM did a lot of
         | work to provide secured devices to government officials. I
         | don't know what government officials are using since RIM went
         | under though.
         | 
         | [0] https://www.nbcnews.com/id/wbna28780205
        
       | saos wrote:
       | This seems rather extreme. I like it!
        
       | [deleted]
        
       | midislack wrote:
        
       | camdenlock wrote:
       | This is mostly great news. Then you scroll down a bit and see
       | this eye-opening 2nd part:
       | 
       | "Apple is also making a $10 million grant [...] to the Dignity
       | and Justice Fund established and advised by the Ford Foundation -
       | a private foundation dedicated to advancing equity worldwide and
       | designed to pool philanthropic resources to advance social
       | justice globally."
       | 
       | So Apple is releasing a great new hardened security mode in iOS,
       | AND... they're donating money to collectivist activism? What a
       | bizarre combination. One step forward, two steps back.
        
       | numpad0 wrote:
       | But how secure are iDevices peripherals, and RAM? I guess it's a
       | start of a journey, but I don't see this does anything yet.
        
       | stephc_int13 wrote:
       | What does it even mean to be a state-level actor? For me this is
       | the same kind of bullshit/PR language that is is used to sell so-
       | called "military-grade" artefacts.
       | 
       | This is nonsense. Security breaches can be discovered and used by
       | anyone with the right knowledge and skills. Geohot was not
       | sponsored by the CIA or the FSB.
        
         | halJordan wrote:
         | State-level is a label for groups that have resources and
         | persistence and perhaps the technical acumen that is available
         | to states.
        
         | WFHRenaissance wrote:
         | I think they're focusing on the notion of protecting against
         | well-funded mercenary firms with the
         | resources/time/ability/motivation to target specific
         | individuals with specific exploits. I have a hard time
         | believing that anyone would enable this Lockdown Mode _prior_
         | to being owned though.
        
           | threeseed wrote:
           | > I have a hard time believing that anyone would enable this
           | Lockdown Mode _prior_ to being owned though
           | 
           | I can imagine many use cases where they would e.g.
           | 
           | journalist enabling this before working on an article that
           | was critical of a foreign government. Or any government
           | contractor, NGO, embassy worker etc.
        
         | threeseed wrote:
         | > Security breaches can be discovered and used by anyone with
         | the right knowledge and skills
         | 
         | That's often not enough.
         | 
         | You need a lot of resources and most importantly prosecutorial
         | immunity.
        
       | the_other wrote:
       | With this announcement, Apple are saying "we will protect you
       | from state actors", which is a role usually performed by states.
       | Apple is saying "we operate at the same level as nation states;
       | we are a nation-state level entity operating in the "digital
       | world": It's a flag-raise.
       | 
       | It's the first such flag-raise I've seen. Security researchers
       | talk about protections from state actors all the time, and there
       | are tools which support that... but this is the first public
       | announcement, and tool, from a corporation with more spare,
       | unrestricted capital than many countries. It comes at a time when
       | multiple nation states are competing for energy and food
       | security; and Apple are throwing up a flag for a security-
       | security fight (or maybe data-security). This is not just handy
       | tech, it's full-on cultural zeitgeist stuff. Amazing.
        
         | jiveturkey wrote:
         | > It's the first such flag-raise I've seen.
         | 
         | "Flag-raise" seems a bit hyperbolic but at any rate I think the
         | BSA asserted such reach and power, long ago. Both have to act
         | within the oversight of actual nation states.
         | 
         | Beyond that, a secure phone is necessary but not sufficient to
         | defend oneself against a nation state.
        
         | ivraatiems wrote:
         | The NSO Group, whom Apple specifically cites as an opponent
         | that inspired this work, is a private corporation. They sell to
         | governments, but so does Apple.
         | 
         | The relationship between state and private industry has never
         | been binary and has always had features like this. I don't
         | think this is a "Jennifer Government" type scenario.
        
         | kccqzy wrote:
         | Google has been dealing with nation state actors targeting its
         | users (Gmail specifically) for a decade now. They have Advanced
         | Protection program. We actually regularly used to hear about
         | how human rights activists were targeted in spear phishing
         | campaigns and then arrested.
         | 
         | https://landing.google.com/advancedprotection/
        
         | bsedlm wrote:
         | agreed, the rise of the corporation as the most powerful
         | institution (above the nation-state) in this new budding global
         | civilization is a long time coming.
         | 
         | on the other hand, this is how democracy dies. what structures
         | (systems) exist to prevent apple (and other comparable
         | corporations) from being an oppresive force against human
         | persons? moreover, what incentives do they have?
        
           | kube-system wrote:
           | Corporations definitely have a lot of power today, but
           | nothing more than they've had in the past.
           | 
           | https://en.wikipedia.org/wiki/Company_rule_in_India
        
           | jfjrkkskdik wrote:
        
           | scottyah wrote:
           | To be fair, banks have been more powerful than a lot of
           | nation-states for awhile, and religious entities before that.
        
             | atlasunshrugged wrote:
             | The religious entities I get the argument but what banks
             | have been more powerful than nation states?
        
               | concinds wrote:
               | The Knights Templar were a religious organisation, but
               | also a quasi-banking institution in Europe; they took and
               | protected deposits of gold, and issued 'cheques'
               | allowing, for example, travellers to deposit gold in
               | London and spend the money in Southern Europe. They were
               | dissolved because they were beginning to rival the Papacy
               | and nations in power due to their immense wealth.
               | 
               | Also, few know this, but many African slaves who were
               | victims of the slave trade became slaves due to debt-
               | slavery (though this didn't involve formal banks). I've
               | seen estimates of up to 25% of slaves back then having
               | been debt-slaves.
        
               | bsedlm wrote:
               | the ones that only service other banks hence only people
               | working in higher level banking are likely to have heard
               | about. e.g. the bank for international settlements
               | 
               | I only found out about this bank because the former
               | president of the mexican central bank -- Mr. Carstens,
               | left the central banking gig to go to that bank.
        
               | atlasunshrugged wrote:
               | From reading their Wikipedia quickly sounds like BIS has
               | a similar function to say the IMF when it comes to
               | financial system stability. I do agree these sorts of
               | organizations exert huge amounts of influence, especially
               | for smaller countries that are dependent on loans and
               | outside financing, but I'm not sure I agree they are more
               | powerful than a nation itself. A nation can
               | (theoretically) decide to opt out from these systems and
               | operate independently, or can play different parties
               | funded by nations (because in the end they all are
               | working for someone's agenda) off of one another as many
               | countries did during the cold war between the U.S. and
               | Soviet Union. But if a nation reneges on its debt, the
               | BIS, IMF, etc. isn't going to invade your country--one of
               | it's creditor nations might, but not them.
        
           | saurik wrote:
           | Based on their history of using their control over the App
           | Store to "protect people" from such harmful content as
           | content about how smartphones are made in sweatshops and
           | tools (such as VPN clients, but also for a long time
           | cryptocurrency wallets) that allow people to bypass
           | restrictions put in place by these nation states that Apple
           | works with, I'd claim these incentives are pretty shit :(.
           | 
           | https://www.youtube.com/watch?v=vsazo-Gs7ms
        
             | astrange wrote:
             | If you try to get into cryptocurrency your phone should
             | automatically deliver electric shocks until you stop.
        
             | [deleted]
        
           | Omniusaspirer wrote:
           | Apple is a public corporation and votes on its corporate
           | direction are freely available on the open market for anyone
           | to purchase. Based on my share ownership Apple is much more
           | subject to my whims than my actual elected politicians are on
           | a % basis.
        
           | ryandrake wrote:
           | I can think of a few, at least applicable in the USA:
           | 
           | Apple doesn't have a military or police force with
           | jurisdiction over me. They don't have the legal power to
           | arrest me or throw me into prisons, which they also don't
           | have. I don't have to pay taxes to Apple. I don't have to do
           | business with them or interact with them in any way if I
           | don't want to. I don't need Apple's permission to do anything
           | unrelated to their product lines.
           | 
           | Same is true for any megacorporation. It's a big stretch to
           | say they are even remotely as powerful as nation-states, let
           | alone more powerful.
        
             | [deleted]
        
             | autoexec wrote:
             | > I don't have to do business with them or interact with
             | them in any way if I don't want to. I don't need Apple's
             | permission to do anything unrelated to their product
             | lines... Same is true for any megacorporation
             | 
             | Nope. You can avoid buying an iphone, but you cannot escape
             | Google. I'm often forced to "do business" with google. I've
             | seen several government websites that require code hosted
             | on Google's servers. I need Google's permission to do all
             | kinds of things unrelated to their service (reCAPTCHA) and
             | google will track everywhere you go online even if you
             | never use any of their services. Facebook also doesn't give
             | you any option. They'll create a profile for you and start
             | collecting data on you even if you've never created an
             | account. You could argue that you pay these companies taxes
             | in the form of your data rather than money, or that the
             | fees they charge developers drive up consumer prices
             | (acting as a tax on the purchases), and I suspect that
             | should Apple/Google pay become more commonplace they will
             | start charging a fee (tax) for that as well. Nothing stops
             | them from doing it.
             | 
             | Some corporations even have their own literal armies
             | (Blackwater/Xe/Academi), but others don't bother because
             | they have the ability to command the police and military
             | wherever they are. The RIAA have their own "swat" team.
             | They participate directly in raids breaking down doors and
             | handling evidence.
             | 
             | Companies like Apple and Google are far more invasive than
             | police watching everything you do, listening to everything
             | you say, recording every person you're in contact with.
             | They censor and ban with impunity. If they really wanted
             | to, they could plant data on your devices that would get
             | you arrested and thrown in prison in any country around the
             | globe.
             | 
             | corporations might not yet be as powerful as a nation
             | state, but they're a lot closer than you give them credit
             | for, and they likely have more direct influence on your day
             | to day life and what happens to you.
        
               | kube-system wrote:
               | No, they're nowhere close to being a nation state. Those
               | spheres of power are nothing compared to something like
               | the British East India Company, which had a currency, an
               | army, and forcefully controlled almost 2 million sq. km.
               | of Asia.
               | 
               | Captchas are definitely worthy of criticism, but they are
               | not remotely on the same level as forcefully controlling
               | the land under someone's feet.
        
             | atlasunshrugged wrote:
             | Yes, the state's monopoly on force is to me what truly
             | differentiates them into a different category of power than
             | a corporation. Also international recognition for nation
             | states and being able to have treaties and the like, but
             | really its the monopoly on use of force. That said, I think
             | the rise of charter cities (think of an SEZ on steroids run
             | by a private corporation) will blur the lines further,
             | although most proposals I've seen for charter cities leave
             | policing to the locality they're residing in.
        
               | tambourine_man wrote:
               | Mandatory taxes, interest rates, printing money... nation
               | states have a lot of power.
        
               | dane-pgp wrote:
               | > interest rates, printing money
               | 
               | Many nation states don't have control over interest rates
               | (because their central banks are run independently of the
               | government) or even the ability to print money, if they
               | have adopted another currency.[0]
               | 
               | > Mandatory taxes
               | 
               | States typically tax transactions which happen on their
               | territory (e.g. wages and sales), and in the case of
               | Apple, their devices are their territory, like feudally
               | controlled tracts of land in cyberspace. Taking a cut of
               | all app sales and in-app purchases seems very much like a
               | tax under this analogy.
               | 
               | [0] https://en.wikipedia.org/wiki/Currency_substitution
        
         | dotnet00 wrote:
         | This feels like an argument the government would make against
         | strong encryption like in the case a few years ago where the
         | government tried to force Apple to unlock an iPhone and Apple
         | refused claiming it wasn't possible.
         | 
         | Apple are basically saying that they're going to do their best
         | in terms of security measures to thwart even state actors,
         | which is only as much of a nation-state level thing as
         | "military grade encryption" is a thing only applicable to
         | militaries.
        
         | axolotlgod wrote:
         | Definitely very interesting. I know Google has their "Advanced
         | Protection Program"[0] with a Titan security key which is
         | similar. It is interesting considering that Google's
         | protections target the user as the weak link, as your data
         | lives on their hardware; while Apple is obviously targeting
         | both the user and the hardware they have. I'm curiuos what
         | security researchers will think of this, if it's more theater
         | or if it is actually a innovative attempt at giving advanced
         | privacy to people who need it. Despite their past stumbles
         | (e.g., CSAM), it seems like Apple is genuinely in the privacy
         | fight, even if it is just for their bottom line.
         | 
         | [0]: https://landing.google.com/advancedprotection/faq/
        
           | alwillis wrote:
           | "About Apple threat notifications and protecting against
           | state-sponsored attacks": https://support.apple.com/en-
           | us/HT212960
        
         | LegitShady wrote:
         | Counterpoint - the EU has been passing laws that force apple to
         | be more fair in their markets, and this "we're protecting you
         | from bad guys" stuff is apple trying to figure out deniable
         | methods to protest or sue against the EU passing laws to
         | restrict apple's ability to lock other developers out.
         | 
         | Throw together a basic set of options that should have been
         | available long ago, now apple is protecting you, don't strip
         | apple of the ability to protect you, etc.
        
         | kmeisthax wrote:
         | There's a bit of a journey from "protecting you against
         | government hackers and spooks" to full-on sovereign states; and
         | there's a _lot_ of things that a country 's government funds
         | that Apple couldn't even begin to take on[0]. Physical security
         | and military operations are a hell of a different field from
         | that of locking down computers.
         | 
         | Furthermore this _isn 't_ the first of its kind; Google has
         | been alerting high-risk Gmail users about state-sponsored
         | hacking for about a decade now. Microsoft probably does
         | something similar. Apple is comparatively late to the party on
         | this. On the offensive side you have the zero-day vendors that
         | broker exploits between hackers and the government.
         | 
         | A better explanation is that Apple isn't supplanting the US
         | government. It's supplanting Halliburton. As more and more
         | people and things go online, hacking and doxxing them is
         | becoming more militarily valuable than just arresting someone
         | or firing a missile. After all, physical attacks risk
         | counterattacks and escalation, but Internet attacks are
         | relatively cheap, not really treated as an attack by many
         | sovereign states, and, most importantly, difficult to
         | attribute.
         | 
         | [0] Call me when Apple black-bags Louis Rossman for illegally
         | repairing MacBooks, or threatens literal nuclear war - like,
         | with uranium bombs and radioactive fallout - on the EU for
         | breaking the App Store business model.
        
           | FredPret wrote:
           | Apple doesn't have to literally have an army and a bureacracy
           | to rival a government. They just need enough flex. And they
           | do!
        
           | alwillis wrote:
           | _Furthermore this isn 't the first of its kind; Google has
           | been alerting high-risk Gmail users about state-sponsored
           | hacking for about a decade now. Microsoft probably does
           | something similar._
           | 
           | It's great that Google alerted Gmail users, but then what?
           | 
           | "We believe you may be a target of a state-sponsored
           | attacker; have a nice day."
           | 
           | Beyond just telling you, Apple is providing some tools to do
           | something about it.
        
             | joshuamorton wrote:
             | Google advanced protection mode has been available for a
             | while.
             | 
             | The threat models are different because the companies
             | provide different services (spear phishing defenses from
             | the web services company, hardware defences from the
             | hardware provider), but still.
        
             | closewith wrote:
             | I not a big supporter of Google in general, but they don't
             | just notify you. They offer to enrol you in their Advanced
             | Protection Program:
             | https://support.google.com/a/answer/9378686?hl=en
        
           | lwswl wrote:
           | I've always thought that the companies coded the "zero day
           | exploits" in, and then sold them for profit.
        
             | PeterisP wrote:
             | It doesn't make sense from numbers perspective, there's
             | simply not that much potential for profit there. In
             | general, the sale price of a zero-day or ten in some
             | popular product is tiny compared to, for example, the
             | marketing budget of that product.
             | 
             | That money is significant from the perspective of a
             | particular employee (i.e. if they personally would get the
             | money) or for a specialized consulting company, but it's a
             | drop in the ocean for the large companies actually making
             | the products. So we should expect some backdoors
             | intentionally placed by rogue employees (either for
             | financial motivation or at the behest of some government)
             | but not knowingly placed by the organizations - unless in
             | cooperation with their host government, not for financial
             | reasons.
        
               | [deleted]
        
             | ivraatiems wrote:
             | I'm not saying it never happens, and I don't want to assume
             | anything about your background, but I think most people who
             | work in software would agree there's no need. Plenty of
             | problems get in on their own.
        
               | skrtskrt wrote:
               | yep if that were your goal it would be way more cost
               | effective to get a zero day from just not trying that
               | hard with security practices. Not having any security
               | knowledge on the team. Not patching/upgrading
               | dependencies with security bugs.
        
               | ivraatiems wrote:
               | And then you have plausible deniability! I think we're
               | hitting on a new business model here...
        
               | dylan604 wrote:
               | RSA weaker key set to default perhaps?
        
         | wyuenho wrote:
         | A nation state has more than one way of extracting information
         | from enemies of said state. There's the civilized way we now
         | call hacking, and then there's the traditional way, which may
         | or may not involve technology.
        
         | labrador wrote:
         | Apple is following the lead of Microsoft in this regard.
         | Microsoft has been acting as an international cyber defense
         | agency for a few years. On the effectiveness of Ukraine's cyber
         | defense: "Microsoft in particular has been hard at work" 21:45
         | 
         | Assessing Russia's War in Ukraine
         | 
         | https://youtu.be/CzbsPOaCrLw?t=1305
        
         | marcodiego wrote:
         | Since the software is still proprietary, considering these
         | statement as guarantees is just an exercise of faith.
        
         | atmosx wrote:
         | Nothing new. When states requested access to covid DB apple and
         | Google refused access based on what happened in the Netherlands
         | in WW2.
         | 
         | I must that on one hand it's anti-democratic, on the other hand
         | western democracies have a rather poor track record on
         | safeguarding this kind of info.
        
         | legalcorrection wrote:
         | I think you're letting the reality distortion field get to your
         | head. They're creating a safe mode for iPhones because a lot of
         | features complex/intricate enough that they are perennial
         | sources of vulnerabilities (and/or UX flaws that lead users to
         | make unsafe decisions).
         | 
         | That is, they're turning features off for security. Something
         | every IT department has been doing for decades. Windows
         | supports this. Mac OS supports this. In fact, iOS was kind of
         | notable in being so unconfigurable. The settings available in
         | their MDM implementation were pitiful and didn't let admins
         | disable many of these features.
        
         | cma wrote:
         | > It's the first such flag-raise I've seen.
         | 
         | After the Snowden leaks that showed even in-country citizen-to-
         | citizen communication was being scooped up by the NSA without a
         | warrant through fiber taps (if I remember that right) when
         | Google replicated the data to out-of-country data centers,
         | Google announced encryption of those links:
         | Google encrypts data amid backlash against NSA spying
         | 
         | https://www.washingtonpost.com/business/technology/google-en...
        
         | modeless wrote:
         | > It's the first such flag-raise I've seen
         | 
         | You haven't been paying attention. Many tech companies have
         | been protecting accounts from state attackers for many years,
         | and explicitly calling out state sponsored attacks. Google
         | introduced state-sponsored attack warnings in 2012 [1] and the
         | Advanced Protection program explicitly protects from state
         | sponsored attacks [2].
         | 
         | [1] https://security.googleblog.com/2012/06/security-warnings-
         | fo...
         | 
         | [2] https://blog.google/threat-analysis-group/protecting-
         | users-g...
        
         | newaccount2021 wrote:
        
         | starwind wrote:
         | > Apple are saying "we will protect you from state actors",
         | which is a role usually performed by states
         | 
         | Not to sound flippant, but defense attorneys do this, too. I
         | don't think it's as big a zeitgeist as you think
        
         | KennyBlanken wrote:
         | Apparently that protection does not include protection from the
         | US government.
         | 
         | iMessage offers excellent privacy of message content, but no
         | 'pen register' protection.
         | 
         | Phone device security is very strong, but it's made largely
         | moot if you turn on iCloud backups (which is the default
         | behavior if you provide an Apple ID. I'm not sure there's even
         | a way to stop the initial backup from happening?)
         | 
         | Apple reportedly doesn't offer e2ee on iCloud, or even
         | encrypted device backups, out of compromise with the federal
         | government...specifically the FBI, CIA, and NSA.
         | 
         | Why might people care about this? Criminalizing abortion and
         | miscarriages...and what looks like at the very least a re-
         | recognizing, and possibly criminalization, of LGBTQ
         | relationships.
        
           | eastbound wrote:
           | True, Apple could stop nagging about backing up into iCloud.
           | 
           | Apple should offer other sorts of backups, and offline iCloud
           | systems.
        
             | threeseed wrote:
             | They do offer other sorts of backups.
             | 
             | You can backup to a Mac or PC. And it's offline and
             | encrypted.
        
           | kube-system wrote:
           | When Apple says "state actor threats" they're not talking
           | about future-state theoretical breaches of domestic privacy
           | by your own government. Apple is always going to follow the
           | law. They're talking about the types of situations where data
           | from people's phones is used to commit international criminal
           | activity, espionage, assassinations, etc.
        
         | mnd999 wrote:
         | Do you also believe the earth is flat?
        
         | unethical_ban wrote:
         | No, they aren't, any more than an OS claiming "military grade
         | encrypted boot drive" means they have a military.
        
         | the_gipsy wrote:
         | It's marketing and you ate the hook, line, and sinker.
        
         | Swizec wrote:
         | > Apple is saying "we operate at the same level as nation
         | states; we are a nation-state level entity operating in the
         | "digital world"
         | 
         | Apple's _profits_ are bigger than my country 's (Slovenia)
         | whole GDP. You bet your butt they're a state level actor in the
         | digital world. They have more resources than many countries.
         | 
         | If Apple was a country, their $365bn in revenue would make them
         | the 43rd richest country in the world right after Hong Kong.
         | 
         | https://en.wikipedia.org/wiki/List_of_countries_by_GDP_(nomi...
        
           | nradov wrote:
           | This also points out how the increasing costs of technology
           | and economies of scale mean that small countries like
           | Slovenia are no longer viable on their own. The only way they
           | will be able to survive the next few decades and avoid
           | turning into failed states is to surrender most of their
           | sovereignty to larger regional alliances.
        
           | amelius wrote:
           | And if you computed the per-capita GDP?
        
             | Swizec wrote:
             | Hard to compute because contractors don't count towards
             | Apple's official headcount. Comes out to $2.5mil/employee
             | using wikipedia numbers.
             | 
             | GDP per capita for Slovenia is $25,179 in comparison. 100x
             | less.
             | 
             | For Hong kong, which makes a bit more GDP than Apple does
             | revenue, the per capita number is $46,323. 50x less than
             | Apple.
        
               | whateveracct wrote:
               | Also silly to compare because a proper nation-state does
               | more than develop products and services for profit.
               | Social contract and all that.
        
               | Swizec wrote:
               | My understanding is that the "social contract" inside
               | many of these large companies is quite cushy. Especially
               | in USA where being employed comes with services
               | traditionally provided by the state like health care,
               | child care, free or subsidized food, retirement benefits,
               | etc.
        
               | whateveracct wrote:
               | It's not especially comparable to what an actual
               | government has to deal with though. It's superficially
               | similar I guess.
        
         | moogly wrote:
         | > It's the first such flag-raise I've seen
         | 
         | Zuckerberg, 5 years ago:
         | https://www.youtube.com/watch?v=mFPAe8Tc2NE
        
           | foobiekr wrote:
           | Perhaps "first credible" is the correct description.
        
             | moogly wrote:
             | I'm not so sure about that; I'm not that impressed by that
             | list of features.
        
         | lolbutwutf wrote:
         | Apple blocking a few features means it's now operating as a
         | nation state.
         | 
         | Tell me it's a Hacker News comment without telling me it's a
         | Hacker News comment.
        
         | whatgoodisaroad wrote:
         | At the same time, if that state actor happens to be China,
         | Apple will just give the government access to your iCloud data.
         | Not all state actors are equally within Apple's striking range.
        
           | KerrAvon wrote:
           | What makes you think so?
        
             | kop316 wrote:
             | https://support.apple.com/en-us/HT208351
        
             | shard wrote:
             | "Apple is moving some of the personal data of Chinese
             | customers to a data center in Guiyang that is owned and
             | operated by the Chinese government. State employees
             | physically manage the facility and servers and have direct
             | access to the data stored there; Apple has already
             | abandoned encryption in China due to state limitations that
             | render it ineffective."
             | 
             | https://www.cpomagazine.com/data-privacy/icloud-data-
             | turned-...
        
               | KennyBlanken wrote:
               | Apple has abandoned encryption for everyone in iCloud.
               | You cannot encrypt anything except a limited subset of
               | your device's data (Apple Health data, mostly.)
        
               | kmeisthax wrote:
               | In Apple's defense E2E encryption also makes it a lot
               | easier to get locked out of your photos and device
               | backups.
               | 
               | IMHO it should still be an option but only as part of
               | Lockdown Mode, with the explicit caveat that turning it
               | on risks losing data.
        
               | holmesworcester wrote:
               | That may be true, but Reuters reported that Apple had a
               | plan for it (which means they felt it was workable) and
               | dropped it due to pressure from FBI/DOJ.
               | 
               | https://www.reuters.com/article/us-apple-fbi-icloud-
               | exclusiv...
               | 
               | Also, there are many users who would benefit from e2ee
               | iCloud backups who are _not_ targets of NSO Group-type
               | attacks, so I don 't think it makes sense to make it only
               | available in "Lockdown Mode".
        
               | mercutio2 wrote:
               | I was all prepared to answer this with "so Reuters
               | reporting something makes it true?", only to discover
               | that, in fact, Reuters reported no such thing.
               | 
               | Reuters makes two claims:
               | 
               | 1) The FBI talked to Apple (duh) 2) An unannounced plan
               | to implement fully E2EE backups was no longer discussed
               | with the FBI at their next meeting
               | 
               | Both of those things might be true! Reuters isn't known
               | for just making stuff like this up, like, say Bloomberg,
               | but the article specifically says:
               | 
               | "When Apple spoke privately to the FBI about its work on
               | phone security the following year, the end-to-end
               | encryption plan had been dropped, according to the six
               | sources. Reuters could not determine why exactly Apple
               | dropped the plan."
               | 
               | So we've got an unannounced product, which the FBI didn't
               | like, which Apple stopped talking to the FBI about
               | (according to some leakers at the FBI).
               | 
               | This does not add up to "Apple dropped plans due to
               | pressure from [the] FBI/DOJ". It adds up to "secretive
               | company discusses plans with secretive agency, and some
               | stuff about that conversation leaked".
        
               | stjohnswarts wrote:
               | I would suggest that if you're doing anything illegal in
               | the country you're staying in, turn off icloud sync at
               | the least, and best policy is don't use an iphone but use
               | an android with an open source operating system like
               | graphene OS
        
               | matwood wrote:
               | > In Apple's defense E2E encryption also makes it a lot
               | easier to get locked out of your photos and device
               | backups.
               | 
               | This is likely the real reason E2E hasn't been done yet.
               | I would wager Apple deals with orders of magnitude more
               | people who are locked out of their phones than the number
               | impacted by the lack of E2E backups. Trusted recovery
               | contact added in the last iOS version is a step in a
               | direction of providing some way to implement E2E, and
               | still give people a way to recover.
        
               | germandiago wrote:
               | I really dislike that there is so much social control :(
               | In theory is to protect you. In practice it can and is
               | misused in so many ways that it should not be even
               | allowed without a judge authorization.
        
               | nradov wrote:
               | You're kind of missing the point. The Chinese government
               | has unlimited social control. Even if there was some sort
               | of written law in China requiring judicial oversight,
               | that wouldn't limit social control because the judiciary
               | is just a rubber stamp.
        
             | atlasunshrugged wrote:
             | Because they are complying with Chinese laws regarding data
             | localization in the country and have been known to work
             | with China (recently YMTC chip deal, previously in a major
             | unreported deal that was unearthed a little while ago) in
             | order to get market access.
             | 
             | https://www.reuters.com/article/us-china-apple-icloud-
             | insigh...
             | 
             | https://www.forbes.com/sites/roslynlayton/2022/06/08/silico
             | n...
             | 
             | https://www.theinformation.com/articles/facing-hostile-
             | chine...
        
               | GeekyBear wrote:
               | How is this different than Microsoft Azure?
               | 
               | Microsoft handed over control of Azure in China to a
               | Chinese company years ago.
        
           | Matl wrote:
           | It is worth mentioning that things like National Security
           | Letters exist in the US. It is also the US who made Apple
           | back off of encrypting iCloud backups E2E.
           | 
           | I wish we were more willing to cite our own government(s) as
           | the bad actors here, rather than pretending that we have to
           | reach for China/Russia/North Korea to find the kind of
           | behavior Apple is attempting to protect its users against
           | here.
        
             | closewith wrote:
             | Not to mention the CLOUD (Clarifying Lawful Overseas Use of
             | Data) Act, which was enacted following a case in 2014 where
             | Microsoft refused to hand over emails stored in the EU (an
             | Irish data centre, in that case) on foot of a domestic US
             | warrant.
             | 
             | The CLOUD Act expressly brings data stored by US-based
             | companies anywhere in the world under the purview of US
             | warrants and subpoenas.
             | 
             | https://en.wikipedia.org/wiki/CLOUD_Act
        
               | gzer0 wrote:
               | How well does this play out with things like GDPR? I can
               | only find one sentence about it but this seems like a
               | direct conflict.
               | 
               | Who wins? The USA, the EU, no one, everyone?
        
               | t0mas88 wrote:
               | It's not entirely clear yet who wins, but the current
               | issues with Google Analytics in the EU seem to be
               | partially related. Some countries have come to the
               | conclusion that GA can't be legal if Google US has access
               | to the data.
        
               | xet7 wrote:
               | USA cloud services are not GDPR compliant:
               | 
               | https://nextcloud.com/blog/the-new-transatlantic-data-
               | privac...
        
               | closewith wrote:
               | It's part of the reason that Privacy Shield collapsed and
               | why the US isn't considered to offer adequate protection
               | to EU residents. It's currently being both litigated (as
               | more and more EU country data protection agencies make
               | individual rulings that specific instances of transfers
               | of personal data to US companies are unlawful) and the
               | subject of intense political negotiation between the EU
               | and US.
               | 
               | Most companies affected are currently awaiting the
               | results of these processes, because following the current
               | precedent to it's logical conclusion, it appears unlawful
               | to transfer any personal data of an EU resident to a US-
               | based company (even if that data remains physically in
               | the EU or another adequate country). That would obviously
               | have catastrophic consequences for the current status
               | quo, so it's hard to believe that a compromise won't be
               | found to avoid it.
               | 
               | However, it's also hard to see a compromise unless the
               | United States exempts EU data subjects from the CLOUD
               | Act, which seem unlikely. Hard to know where it'll go.
        
               | legalcorrection wrote:
               | This has always been the law. Common law courts have been
               | issuing court orders that require you to take actions in
               | foreign countries, even in violation of foreign law, for
               | as long as it's been a legal question. The CLOUD Act
               | actually introduced some additional safeguards and allows
               | judges to consider the seriousness of the foreign law
               | violation with the importance of the court getting access
               | to the foreign-stored data.
               | 
               | You unfortunately need something like this because
               | otherwise people will just hide documents, money, stolen
               | property, etc. in foreign countries out of reach of US
               | courts, even if they are US persons and corporations.
        
           | kube-system wrote:
           | Yes, this is Apple protecting you against _extralegal_ state
           | actor threats. There 's not really much Apple can do to
           | protect you against the laws of your own country.
        
           | jonny_eh wrote:
           | > Apple will just give the government access to your iCloud
           | data
           | 
           | "You" only means you if you're a Chinese citizen.
        
             | savoytruffle wrote:
             | resident
        
           | acomar wrote:
           | and if the state actor happens to be the US? which of these
           | tech companies do you expect to look after you then?
        
           | milesskorpen wrote:
           | If you opt-in to iCloud, you're opting in to a lot of state-
           | level security risk in any country (and this is true of any
           | commercial cloud).
        
             | Maxburn wrote:
             | We have seen reports that apple can remotely enable icloud
             | backups and then trigger a backup.
        
               | Nextgrid wrote:
               | Do you have more info about this?
        
               | nojito wrote:
               | Source? iCloud backups can only be triggered via your
               | passcode which is secured against the secure enclave.
        
               | threeseed wrote:
               | This doesn't sound plausible in the slightest.
               | 
               | The only persistent connection Apple has that I can think
               | of to implement such a concept is for push notifications.
               | Which would be a massive security hole if a HTTP response
               | to that daemon was capable of bypassing the lock screen,
               | secure enclave etc.
               | 
               | And the logical question is if they had such a system why
               | would they bother triggering an iCloud Backup when they
               | could ask the device to specifically hand over certain
               | information e.g. Messages. Which at least could be done
               | quietly over Cellular.
        
             | KennyBlanken wrote:
             | Nothing stops Apple from offering e2ee backups, and in fact
             | they do this for certain data backed up to iCloud (health
             | data for example.)
             | 
             | But your iMessage data...well there, your ass is hanging
             | out in the breeze. In fact, I'm not sure it's possible to
             | log into an iPhone with your Apple ID and not have an
             | iCloud backup immediately fire off, which means your
             | private encryption keys hit iCloud and stay there until it
             | is purged according to their data retention policies. And
             | we have no idea what those policies actually are; those
             | keys made end up stored forever.
        
               | GeekyBear wrote:
               | > Nothing stops Apple from offering e2ee backups
               | 
               | The US Government pressured them to drop a plan for fully
               | encrypted cloud backups.
               | 
               | >Apple dropped plan for encrypting backups after the FBI
               | complained
               | 
               | https://www.reuters.com/article/us-apple-fbi-icloud-
               | exclusiv...
               | 
               | If you want a fully encrypted backup of your device, you
               | have to make it to your local Mac or Windows computer.
        
               | astrange wrote:
               | > Nothing stops Apple from offering e2ee backups, and in
               | fact they do this for certain data backed up to iCloud
               | (health data for example.)
               | 
               | Almost all users can't handle this; to support people,
               | you need to be able to recover their account when they've
               | lost every single password and proof of identity they
               | possibly can. It's not a backup if you can't restore it.
        
               | mehrdada wrote:
               | > In fact, I'm not sure it's possible to log into an
               | iPhone with your Apple ID and not have an iCloud backup
               | immediately fire off
               | 
               | You are correct there's a bit of dark pattern going on
               | here, but it is possible (to the extent the code does
               | what it says of course). To be extra sure I have a custom
               | lockdown MDM profile to disallow iCloud backups, as well
               | as a number of other nefarious things like analytics, and
               | whenever I get a new device, I first DFU restore it to
               | the latest iOS image to ensure software (post bootrom)
               | isn't tampered with, then activate and install the MDM
               | profile via a Mac and only then I interact with the
               | device and go through setup.
        
               | thewebcount wrote:
               | > I'm not sure it's possible to log into an iPhone with
               | your Apple ID and not have an iCloud backup immediately
               | fire off
               | 
               | Yes, it absolutely is possible. I have never turned on
               | iCloud backup so I have no cloud backups of any of my
               | phones or other devices.
        
           | ivraatiems wrote:
           | I mean, since your phone was made there by a Chinese company,
           | what's to stop the government from just forcing a backdoor in
           | at the factory?
        
         | time_to_smile wrote:
         | I don't know if you've been paying attention to Apple's
         | strategy over the last year, but it's basically been "granting
         | user privacy also happens to grant us an advertising/data
         | monopoly"
         | 
         | I don't think the aim here is to block at state actors but to
         | basically continue to close all security holes that can be
         | exploited by any other company and continually proving to users
         | that Apple cares about privacy.
         | 
         | The things is I really like Apple even more now since they have
         | realize that my privacy interests can be tightly aligned with
         | their own economic interests. I never trust companies to be
         | good or look out for my interest even when I pay them to, but
         | when my privacy ultimately means they gain a very strong
         | competitive edge the I'm much more trusting.
         | 
         | Apple has realized they can become to privacy what Google has
         | been to ubiquitous search, and doing so can reap even larger
         | and more secure rewards.
         | 
         | They started with a walled garden and now extending it to
         | fortress surrounding the garden.
        
           | happyopossum wrote:
           | > advertising/data monopoly
           | 
           | not to be glib, but 'citation please?'
           | 
           | Other than running ads _inside the App Store_ , do you have
           | any knowledge or evidence of Apple collecting personal
           | information for advertising or any other use?
        
         | germandiago wrote:
         | This is good news IMHO because it encourages that companies
         | compete for the best offer in that space as they go.
         | 
         | In some way it reminds me (with all the differences!) of how
         | things like cryptocurrencies could remove the state from a
         | monopoly.
         | 
         | Good news for me this announcement!
        
         | spamfilter247 wrote:
         | Microsoft has a "Democracy Forward" team (previously called
         | "Defending Democracy") that aims to protect government
         | officials and systems from adversarial state actors. It's been
         | ongoing for a few years now.
         | 
         | https://www.microsoft.com/en-us/corporate-responsibility/dem...
        
         | Nuzzerino wrote:
         | > Apple is saying "we operate at the same level as nation
         | states; we are a nation-state level entity operating in the
         | "digital world": It's a flag-raise
         | 
         | Maybe. But these security "features" feel like things that
         | should have been there from the beginning. Windows 11 has
         | already had a much wider and deeper array of security options.
         | Sure, it's not mobile, but many of those security options would
         | be unlikely to be needed against unsophisticated attacks.
         | 
         | Flag-raise or marketing gimmick? You be the judge I guess.
        
         | stefan_ wrote:
         | I think you need to put away the pipe, this is Apple saying "we
         | can't make JIT work safely so here's an option to turn it off".
        
           | threeseed wrote:
           | > Apple saying "we can't make JIT work safely so here's an
           | option to turn it off"
           | 
           | To be fair has anyone made it work safely ?
        
           | alwillis wrote:
           | This is more like "there are always going to be zero-day
           | exploits out there and until we can fix them, this is the
           | next best thing."
        
         | ziddoap wrote:
         | > _Apple is saying "we operate at the same level as nation
         | states; we are a nation-state level entity operating in the
         | "digital world"_
         | 
         | Making mountains out of molehills.
         | 
         | I'm pretty sure they are saying that they will "offer
         | specialized additional protection to users who may be at risk
         | of highly targeted cyberattacks from private companies
         | developing state-sponsored mercenary spyware".
         | 
         | There is a looooong list of things which nation states can do
         | which Apple cannot, some examples of that are in other comments
         | in this thread.
         | 
         | > _but this is the first public announcement, and tool, from a
         | corporation with more spare, unrestricted capital than many
         | countries._
         | 
         | Google & Microsoft have both had fairly long-standing tools and
         | procedures (which were publicly announced) to both alert users
         | and aid users against nation state attacks.
        
           | sodality2 wrote:
           | Google's Advanced Protection program is the same:
           | https://landing.google.com/advancedprotection/
        
           | alwillis wrote:
           | Apple also started alerting people being targeted by state
           | actors last year [1].
           | 
           | [1]: "About Apple threat notifications and protecting against
           | state-sponsored attacks" https://support.apple.com/en-
           | us/HT212960
        
       | lizardactivist wrote:
       | It's good I guess, but I will not convince myself that a button
       | saying "Lockdown mode" will casually side-step the entire legal
       | and surveillance machinery built up in the U.S.
        
       | toomim wrote:
       | > Messages: ... Some features, like link previews, are disabled.
       | 
       | I've been wanting to disable link previews for YEARS!! Not for
       | security, but to keep those corporate advertisements (aka
       | previews) out of the conversations I have with my friends and
       | family.
       | 
       | It feels super disingenuous when I type out an articulate,
       | heartfelt, personal message to my loved one, character by
       | character, anticipate their reaction reading it, and then hit
       | send -- only to find the URLs expanded 400 pixels into corporate
       | advertisements designed by the bonehead SEO jerks who care about
       | clickbaiting over content.
        
       | donkarma wrote:
       | could always just not use a smart phone
        
       | concinds wrote:
       | Could a security expert enlighten me: is Windows more secure
       | today than macOS, if we purely take OS-level and hardware-level
       | security measures and ignore subjective factors? (like
       | marketshare, attractiveness of targets, etc.)
       | 
       | Windows has all sorts of buzzwordy-sounding security features:
       | Microsoft Defender Application Guard (Hyper-V for untrusted
       | websites & Office files), kernel virtualization-based security
       | (VBS), Code Integrity Guard, Arbitrary Code Guard, Control Flow
       | Guard, and Hardware-enforced Stack Protection.
       | 
       | It's extremely hard to compare the two on a deep technical level
       | (beyond "modern OS's are safe, install updates, you'll be fine")
       | without having deep security experience. Any professional
       | insights?
        
       | [deleted]
        
       | throw20220706 wrote:
       | Reminds me of a classic https://xkcd.com/538/.
       | 
       | For the vast majority of users the most realistic threat is
       | simply being ordered to unlock their phone under the threat of
       | force (from a criminal, a cop, a CBP agent, etc). This is way,
       | way more likely than being attacked through an unknown JIT
       | compiler vulnerability.
       | 
       | What would be _really_ helpful is Apple implementing a way to
       | have multiple iPhone profiles with plausible deniability (a la
       | VeraCrypt) or some sort of compartmentalization (a la 1Password
       | travel mode).
       | 
       | Of course that would mean people can start sharing their phones
       | instead of buying one per person from Apple, so I'm not holding
       | my breath.
        
       | rootsudo wrote:
       | That's the thing, if you think your device is compromised, don't
       | use it. This is dangerous as it's a bandage and most likely
       | allows surveillance that's "pre-approved" or is carrier based,
       | probably even baseband modem based.
        
       | pluc wrote:
       | Apple's been making it real difficult to pick Android lately.
       | Only thing Android still has going for it is the ability to flash
       | custom ROMs, eg CalyxOS or Graphene.
        
         | lern_too_spel wrote:
         | Better security, more features, more privacy, and more user
         | control in general are significant reasons to choose Android.
        
           | pluc wrote:
           | Compare the actions of Google versus the actions of Apple and
           | it's real difficult to think Google has your privacy in mind
        
             | lern_too_spel wrote:
             | Compare the actual features of Android vs. the actual
             | features (instead of the marketing) of iOS, and it's clear
             | that Apple doesn't care about user privacy. With Android,
             | you get to choose which if any Google services to use. On
             | iOS, you can't run any apps without telling Apple which
             | ones, you can't get your location without also sending your
             | location to Apple, and you can't practically run your own
             | apps without fully deanonymizing yourself with banking
             | details.
        
         | viktorcode wrote:
         | Android has a wide plethora of devices, Apple can't make
         | hardware catering to everyone's needs.
        
           | pluc wrote:
           | That is not an Android advantage. Tightly controlled hardware
           | makes it so much easier to control software. You ever built
           | an app for Android? It sucks
        
         | ysleepy wrote:
         | On Android I can use a firewall to block network access per
         | app. on iOS that is not possible.
         | 
         | My password manager app might be bought out and exfiltrate all
         | my credentials, or any of the linked libraries it uses.
        
           | idle_zealot wrote:
           | > My password manager app might be bought out and exfiltrate
           | all my credentials
           | 
           | This is less likely if you use Apple Keychain for your
           | passwords. _lock-in intensifies_
        
             | sneak wrote:
             | Apple Keychain requires iCloud. Most of iCloud is not end
             | to end encrypted.
        
         | oblio wrote:
         | Maybe they changed this lately, but can you copy files through
         | USB to an iPhone?
        
         | lordofgibbons wrote:
         | I explored installing a custom ROM on my android phone, but
         | ended up questioning the utility of them. There appears to be
         | many banking apps, random apps (McDonalds??) and others that
         | will not work if the device is running a custom ROM.
         | 
         | That makes my phone useless to me.
         | 
         | Our only hope is a proper Linux phone with an Android emulation
         | layer
        
           | SirYandi wrote:
           | You can get around that by spoofing safteynet stuff using
           | Magisk. But yeah, it is a few more hoops to jump through and
           | you need to be rooted which is itself not great for security.
        
       | yrgulation wrote:
       | What if there is a little device that acts like network firewall
       | and router appliances but somehow the phone proxies all
       | connectivity via it. Something to carry around that shows ingress
       | and egress connections, calls and anything in between. You can
       | either set an allowed or blocked list, detects cell connection
       | mitm attacks and spikes in traffic (to detect leaks). Mobile
       | phones are like desktop computers and will always have security
       | issues. It only makes sense to firewall them.
        
         | bistable wrote:
         | Why not on the same device? Have a separate small simple SoC
         | completely segregated from everything else, except shared
         | battery, with 2 NICs and a physical switch to swap between
         | using the firewall interface and the regular phone. Although
         | this may make more sense for a regular computer plus router,
         | with a cell phone there's multiple radios, not just a single
         | simple IP connection...
        
           | yrgulation wrote:
           | Issue is that we would have to get device makers to buy into
           | it, and also trust them that they show us everything. Also we
           | wouldn't be able to retrofit existing devices. Most people
           | dont like tinkering with things. A universal device small
           | enough to fit in your pocket, with a nice little display or a
           | usb connector to download data to a laptop and configure
           | rules, is more desirable imo.
        
         | jiveturkey wrote:
         | Like your own personal stingray
        
           | yrgulation wrote:
           | Had to look it up. I guess the question is how to make sure
           | it cant be abused by capturing data from random nearby
           | phones. In that case we'd end up worse off.
        
         | Nextgrid wrote:
         | TLS and certificate pinning makes this a problem. Technically
         | certificates don't have to be pinned, but if they weren't then
         | people would use this to defeat "growth & engagement" and block
         | analytics, ads, etc (or worse, reverse-engineer the API to make
         | a third-party client) and we obviously can't have that.
        
           | [deleted]
        
       | Veserv wrote:
       | I do not know why anybody would believe any claim by Apple with
       | respect to security without overwhelming empirical evidence
       | supporting their claims. The default assumption in commercial
       | software security, supported by literal decades of abject failure
       | by every player, is that commercial software security is
       | atrocious. To claim anything more than trivial security is a
       | extraordinary claim and thus demands extraordinary evidence
       | before being accepted.
       | 
       | Apple has demonstrated no such evidence. In fact, the opposite is
       | the case. Despite decades of assurances that their systems
       | provide meaningful security, every single year we see their
       | security torn apart by individuals and small teams with budgets
       | that do not even constitute rounding errors to a Fortune 500
       | company. There is exactly no reason to believe they have
       | meaningfully superior technical expertise with respect to
       | security relative to the default standard of the industry.
       | 
       | However, this should be no surprise to anyone as the security
       | certifications that Apple advertises for iOS [1][2] are only
       | "applicable where some confidence in correct operation is
       | required, but the threats to security are not viewed as serious."
       | [3][4]. I mean, look at [4], the process used to certify their
       | security is that their evaluators typed search terms into the
       | internet and verified that every vulnerability that turned up was
       | patched, _that's it_. There is no requirement to even do a
       | independent analysis that it protects against attackers with a
       | _basic_ attack potential, that is done at the next higher level
       | of security that they could have chosen to certify against, but
       | did not.
       | 
       | To be fair, Apple has historically demonstrated the ability to
       | certify against AVA_VAN.3 which demonstrates resistance to
       | attackers with a _enhanced-basic_ attack potential, but they have
       | failed every time they have ever attempted to certify against
       | AVA_VAN.4 which demonstrates resistance to attackers with a
       | _moderate_ attack potential. It should be no wonder that they can
       | not protect against _moderate_ attack potential threats such as
       | individuals or small teams, let alone _high_ attack potential
       | threats such as large organized crime and nations.
       | 
       | If Apple wants their security claims to be taken seriously, they
       | should start by demonstrating their ability to protect against
       | _moderate_ attack potential threats via the internationally
       | recognized security certification process they already use and
       | advertise. Until then, the only thing we should trust is what
       | they certify they can do (protect against script kiddies), not
       | what they have failed to ever achieve in a auditable manner
       | (protect against moderately skilled attackers).
       | 
       | [1] https://support.apple.com/guide/sccc/security-
       | certifications...
       | 
       | [2] https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11146
       | 
       | [3] https://www.niap-
       | ccevs.org/MMO/Product/st_vid11146-aar.pdf#p...
       | 
       | [4]
       | https://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3...
        
       | walrus01 wrote:
       | putting rich media like images, GIFs, video etc embedded inline
       | in chat applications presents a huge attack surface.
       | 
       | i'm even suspicious that signal does it.
       | 
       | if you really want to design a secure messaging system it needs
       | to handle text ONLY.
        
         | notriddle wrote:
         | Text rendering is more complex than decoding a PNG.
        
       | lwswl wrote:
       | Honestly, this is bad news, because it means Apple is no longer
       | capable of offering both security and all features, but now needs
       | to spit them into groups, presumably because they need to keep up
       | with (the clearly less secure) Android...
        
         | lekevicius wrote:
         | I see this as securing against "unknown unknowns". No software
         | can ever be "100% bug free". If you can identify areas that are
         | more likely to contain yet-undiscovered vulnerabilities and
         | turn them off in advance, the device becomes more secure.
        
         | olliej wrote:
         | No, this is a completely reasonable response.
         | 
         | Security by reducing attack surface is a standard, and sensible
         | response.
         | 
         | What you are asking for is that Apple (or any company) be able
         | to produce absolutely 100% bug free code, no matter the
         | complexity or requirements. This feature is an acknowledgement
         | that what you're asking for is an unreasonable demand for any
         | company.
         | 
         | So Apple has looked at the attack surface present by default,
         | and then provided an option to that trades off removing
         | presumably low use features in exchange for removing large
         | attack surface. That is a trade off: for example any modern
         | phone would be vastly more secure if all it could do is make
         | phone calls, and everything - the browser, apps, etc - were
         | disabled. But that end of the spectrum results in an
         | impractically restricted device, in reality there's a middle
         | ground, but for high profile targets the trade off is closer to
         | "just a phone" than it is for normal users.
         | 
         | An example is the RW^X region required to support JITting JS -
         | the OS simply supporting such memory region at all was a huge
         | addition of attack surface to the platform - prior to that
         | every single executable page was protected by code signing,
         | afterwards there was a region that by definition the OS could
         | not verify, and it has been used by every attack since then.
         | But disabling that simply disables the JIT, the JS interpreter
         | runs, so the impact is only that some web content runs slower,
         | but the functionality itself is still there.
         | 
         | Similar for messages: receiving JPEGs is super common,
         | receiving OpenEXR or whatever probably isn't, so removing
         | everything other than JPEG by default again removes attack
         | surface without realistically impacting the usability of
         | messages.
        
         | npteljes wrote:
         | Security and convenience _can_ coexist, but you can't
         | transition into a more secure world without breaking
         | convenient, insecure stuff that already exists and users expect
         | it to just work. Later they can ramp this up.
        
         | capableweb wrote:
         | Security has never been "Secure or not" proposition, it's
         | always a balance between convenience and safety against
         | threats, threats that change depending on who you are, and who
         | is targeting you.
         | 
         | Some features are (understandably) almost impossible to make
         | very safe. Take PDF viewing for example, the entire thing is so
         | huge, that it's bound to be holes in any implementation, just
         | like what the NSO proved some time ago with the iMessage
         | exploit.
         | 
         | I take this effort as something similar to the "Hardened Linux"
         | effort. Just that it exists doesn't mean that Linux is
         | "unsecure", it just means that if you really need to, there is
         | more steps you can take to make it even more secure. Just like
         | what Apple is doing here.
        
           | vorpalhex wrote:
           | If I could upvote you twice, I would.
           | 
           | Security is _always_ a tradeoff and there is no single
           | answer. A feature for one person is another person 's hell.
           | 
           | An acquiantance just lost all their data because they had
           | enabled "format on too many missed passcodes" and their kid
           | was playing with their phone.. caused quite a few tears. On
           | the other hand, that feature is invaluable to international
           | travelers.
        
             | lekevicius wrote:
             | What a strange implementation of "format on too many missed
             | passcodes". Apple (on iOS and watchOS) implements this, but
             | after some amount of failures, phone gets into
             | progressively longer lockdowns. So maybe after 3 failed
             | attempts you have to wait 2 minutes, after 4th 5 minutes,
             | and before the final (formatting) attempt you have to wait
             | something like 12 hours. This prevents "kid playing with
             | the phone" problem.
        
         | alwillis wrote:
         | _Honestly, this is bad news, because it means Apple is no
         | longer capable of offering both security and all features..._
         | 
         | Absolutely not true.
         | 
         | There's a difference between being secure and having all of the
         | features and being secure against a state-level attacker. The
         | vast majority of users are quite secure while enjoying all of
         | the features of their iPhones.
         | 
         | For those who are being targeted, potentially in a life or
         | death situation, being able to send attachments in iMessage is
         | trivial by comparison. Only a tiny percentage of iPhone users
         | should ever have to enable this; it won't impact the user
         | experience of over 95% of iPhone users _at all_.
        
       | WmyEE0UsWAwC2i wrote:
       | But should apple we liable when they, or any other organization
       | making such claims, inevitably fail to protect their users?
       | 
       | I think their should.
        
         | KerrAvon wrote:
         | How do you propose to do that without disincentivizing the
         | addition of such features? Even NASA has software failures.
        
       | verdagon wrote:
       | Very cool! I wonder if this, combined with some sandboxing for
       | apps' unsafe code, could make a more secure OS than any previous
       | mainstream ones.
        
       | jasonhansel wrote:
       | Downside: if attackers can tell that you've enabled Lockdown
       | Mode, then they know that you're likely a high-value target.
        
         | [deleted]
        
       ___________________________________________________________________
       (page generated 2022-07-06 23:00 UTC)