Apple: Difference between revisions

added a comment on the use of tone in the article. not sticking a warning on just yet, as there's already an 'under active development' notice
No edit summary
Line 33: Line 33:
Users often complain of new OS versions slowing down their device. Once a new version is installed, there is no opportunity to go back. This also restricts the user's choice to jailbreak the device, as the latest version naturally has patches for the latest jailbreak exploits. App developers also require access to earlier iOS versions to test that their app works correctly. The alternative, Xcode's iOS Simulator, is not a complete replacement for real hardware, as it does not have all features of a physical device.<ref>https://contextqa.com/test-on-ios-emulators-simulators/</ref> Instead, app developers are forced to purchase several test devices, and remember to ''never'' allow them to update.
Users often complain of new OS versions slowing down their device. Once a new version is installed, there is no opportunity to go back. This also restricts the user's choice to jailbreak the device, as the latest version naturally has patches for the latest jailbreak exploits. App developers also require access to earlier iOS versions to test that their app works correctly. The alternative, Xcode's iOS Simulator, is not a complete replacement for real hardware, as it does not have all features of a physical device.<ref>https://contextqa.com/test-on-ios-emulators-simulators/</ref> Instead, app developers are forced to purchase several test devices, and remember to ''never'' allow them to update.


== Mobile Device Security - Undetectable Spyware ==
Mobile Devices from Apple (iPhone,iPad,Apple Watch and Vison Pro) are iOS based. This means they are running a completely locked down Operating System. The End User is only able to run Software moderated by Apple, No direct access to internal logs or runtime access is provided . Because of this locked down nature it is extremely difficult for Security researchers to obtain enough data from those Devices easily to detect breaches in security.<ref>https://media.ccc.de/v/38c3-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-ios#t=2763</ref>  Spyware is able to run unnoticed and use the nature of the locked down Systems to their advantage. It is possible to develop spyware in a way that makes detecting it very difficult after the attack. A solution would be to gain easy access to runtime logs and give kernel access to trusted sources like spyware detection software. The reason Apple is not providing this access is simply because of the negative effect it would have on their ability to control and sell all Software run on those devices.


== Parts Availability ==
== Parts Availability ==