Apple: Difference between revisions
Added a Wikipedia link. |
Added Parts, Diagnostic, and Repair Centers subsections |
||
Line 35: | Line 35: | ||
== Mobile Device Security - Undetectable Spyware == | == Mobile Device Security - Undetectable Spyware == | ||
Mobile Devices from Apple (iPhone,iPad,Apple Watch and Vison Pro) are iOS based. This means they are running a completely locked down Operating System. The End User is only able to run Software moderated by Apple, No direct access to internal logs or runtime access is provided . Because of this locked down nature it is extremely difficult for Security researchers to obtain enough data from those Devices easily to detect breaches in security.<ref>https://media.ccc.de/v/38c3-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-ios#t=2763</ref> Spyware is able to run unnoticed and use the nature of the locked down Systems to their advantage. It is possible to develop spyware in a way that makes detecting it very difficult after the attack. A solution would be to gain easy access to runtime logs and give kernel access to trusted sources like spyware detection software. The reason Apple is not providing this access is simply because of the negative effect it would have on their ability to control and sell all Software run on those devices. | Mobile Devices from Apple (iPhone,iPad,Apple Watch and Vison Pro) are iOS based. This means they are running a completely locked down Operating System. The End User is only able to run Software moderated by Apple, No direct access to internal logs or runtime access is provided . Because of this locked down nature it is extremely difficult for Security researchers to obtain enough data from those Devices easily to detect breaches in security.<ref>https://media.ccc.de/v/38c3-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-ios#t=2763</ref> Spyware is able to run unnoticed and use the nature of the locked down Systems to their advantage. It is possible to develop spyware in a way that makes detecting it very difficult after the attack. A solution would be to gain easy access to runtime logs and give kernel access to trusted sources like spyware detection software. The reason Apple is not providing this access is simply because of the negative effect it would have on their ability to control and sell all Software run on those devices. | ||
== Parts Availability == | |||
Many parts are not available directly from Apple. Those that are available directly from Apple may be more expensive than paying Apple to repair your device. Parts available to certified repair centers are extremely limited. Apple does not stock current generation iPad parts within GSX (See Certified Repair Centers). A limited selection of iPad parts are available from iFixit, however this can exclude some flex PCBs necessary for repairing headphone jacks. | |||
== Diagnostic Software Availability == | |||
Calibration software for some Apple devices has only recently become available to end users. End user calibration tools have only become accessible in iOS 18. Similar calibration tools have been available to Certified Repair Centers, but are generally limited as many parts are serialized ie; lid sensors on Mac Books. | |||
== Certified Repair Centers == | |||
Certified Repair Centers have some limited access to Apple's proprietary backend (GSX2). GSX contains many tools necessary to repair devices such as; diagnostic tools, calibration tools, parts catalog, and device repair history. GSX is only accessible to repair centers Apple deems certified. GSX does not stock parts for iPads. It does not allow the calibration of parts such as lid sensors for a device, if that device does not have an open repair and purchased parts. The new iOS 18 calibration tool is very similar to Apple's ASU (GSX's diagnostic/calibration tool) Some videos of GSX can be found online. See: https://www.youtube.com/watch?v=wy8bS1AgxcY | |||
== References == | == References == |