Supply Chain Market Research - SCMR LLC
  • Blog
  • Home
  • About us
  • Contact

Apple Crackers

7/7/2022

0 Comments

 

Apple Crackers
​

Picture
Security Software is complex at best and those who delve into this arcane science are want to spend hours poring over lines of code that could as well be a foreign language to most, but black hat or white hat, discovering a vulnerability buried in millions of lines of code is like cracking the Da Vinci code and can catapult the discoverer to fame in this very specialized world.  Apple (AAPL) has been battling with a small Israeli company, NSO Group (pvt), and Q Cyber (pvt) who developed one of its security software products based on a zero-day[1] vulnerability discovered in iOS.  The defendants allege that they sell their software known as Pegasus, only to governments and law enforcement agencies as ‘lawful tools to fight terrorists and pedophiles’, while Apple alleges that’ the software has been used to perpetrate attacks on Apple users and data stored on user’s devices’, although not on Apple’s own servers.
Apple classifies the defendants as hackers and to their point the US government has placed the company on its trade blacklist, although the company insists the software cannot be used for surveillance in the US, while Apple alleges that it has been used on iOS mobile devices owned by US citizens and has therefore crossed international borders.  NSO and Q Cyber have also faced lawsuits by other major CE companies, among whom are Microsoft (MSFT), Meta (FB), Google (GOOG), and Cisco (CSCO) but claim immunity from revealing customers as the governments to whom they sell their software should receive, although a recent 9th Circuit Court ruling held that the companies are not sovereigns and are therefore unable to claim immunity.
The iPhone and Apple products generally are considered among the most secure and are therefore used by lawyers, political officials, activists, and others who count of Apple’s security features to protect them from surveillance and data collection, but Apple alleges that while the company says they only sell the software, they have created fictitious Apple accounts  and even admitted that their products have been used (maliciously) to violate fundamental human rights, but at the same time has continued to update the software to exploit multiple iOS vulnerabilities in order for the software to continue to capture communications, location history, Wi-Fi passwords, and a variety of other private data on phones that have been infected by the software tool.
Apple has just announced that it will be adding ‘Lock Mode’ to iOS 16 that will put the device into the highest security mode possible, for what will likely be a relatively small group of iOS users that need to be protected from what is military grade hacking software. The new mode will block all message attachments except images along with message previews and will do the same for Facetime invites from anyone outside of your list, while blocking all wired connections with other computers, principally closing the Lightning port for everything other than charging, and finally Lockdown mode will not allow any new configuration profiles to be added to the device or will it allow any unrecognized code to be run from the messaging app.  Apple is so serious about this software that it is offering $2m[2] to anyone who can find a way to bypass the new mode and will donate $10m plus any proceeds from the lawsuit to organizations that investigate or expose targeted cyberattacks against journalists, human rights activists, and other targeted individuals. 
All in, the security space is one that pits power and greed against the conveniences that consumers want and expect and that balance changes constantly.  With every new update or patch comes the resources of those who wish to exploit individuals for their own purposes, political or otherwise, so the battle will continue, essentially using resources that could be used for more altruistic purposes, but the battle really comes down to how much security inconveniences the consumer, who thinks they have a handle on security because they change their password once or twice a year.  In this case, the fix is really targeted to a very small group of Apple customers and would not be used by most, but on a general basis the average consumer is vulnerable to a wide variety of malware and corporate security remains lacking as noted in the list of the 5 largest security breaches compiled by UpGuard last month.


[1] A zero-day vulnerability is one that has been discovered and disclosed but has not been patched.  Usually these are discovered by developers or research scientists before the company that originated the software, leaving users open to the vulnerability until the software’s developers can correct the flaw with an update or patch.

[2] Twice what Apple normally offers
Picture
0 Comments



Leave a Reply.

    Author

    We publish daily notes to clients.  We archive selected notes here, please contact us at: ​[email protected] for detail or subscription information.

    Archives

    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    January 2024
    November 2023
    October 2023
    September 2023
    August 2023
    June 2023
    May 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    October 2020
    July 2020
    May 2020
    November 2019
    April 2019
    January 2019
    January 2018
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    September 2016

    Categories

    All
    5G
    8K
    Aapl
    AI
    AMZN
    AR
    ASML
    Audio
    AUO
    Autonomous Engineering
    Bixby
    Boe
    China Consumer Electronics
    China - Consumer Electronics
    Chinastar
    Chromebooks
    Components
    Connected Home
    Consumer Electronics General
    Consumer Electronics - General
    Corning
    COVID
    Crypto
    Deepfake
    Deepseek
    Display Panels
    DLB
    E-Ink
    E Paper
    E-paper
    Facebook
    Facial Recognition
    Foldables
    Foxconn
    Free Space Optical Communication
    Global Foundries
    GOOG
    Hacking
    Hannstar
    Headphones
    Hisense
    HKC
    Huawei
    Idemitsu Kosan
    Igzo
    Ink Jet Printing
    Innolux
    Japan Display
    JOLED
    LEDs
    Lg Display
    Lg Electronics
    LG Innotek
    LIDAR
    Matter
    Mediatek
    Meta
    Metaverse
    Micro LED
    Micro-LED
    Micro-OLED
    Mini LED
    Misc.
    MmWave
    Monitors
    Nanosys
    NFT
    Notebooks
    Oled
    OpenAI
    QCOM
    QD/OLED
    Quantum Dots
    RFID
    Robotics
    Royole
    Samsung
    Samsung Display
    Samsung Electronics
    Sanan
    Semiconductors
    Sensors
    Sharp
    Shipping
    Smartphones
    Smart Stuff
    SNE
    Software
    Tariffs
    TCL
    Thaad
    Tianma
    TikTok
    TSM
    TV
    Universal Display
    Visionox
    VR
    Wearables
    Xiaomi

    RSS Feed

Site powered by Weebly. Managed by Bluehost