As an Internet technology giant, Apple's attention and influence need not be said.
Some time ago, it was also a hot search, such as losing a lawsuit with 80,000 employees due to the problem of off-duty bag search, and was sentenced to more than 200 million yuan in compensation; The App Store China region was exposed to a large number of pornographic apps.
But in general, these events have no direct stake in most ordinary users.
However, on August 19, half a month before the iPhone 14 was launched, Apple released two security reports.
The report revealed serious security vulnerabilities in the company's smartphone iPhone, tablet iPad and iMac products.
For example, a remote code execution vulnerability called "CVE-2022-32893" was published in Apple's HTML rendering engine.
This vulnerability could allow hackers to hack into a user's device, gain administrative privileges, or even take full control of the device and run the applications within it.
Apple internally calls it "Zero Vulnerability", which confirms its seriousness. Moreover, the scope of equipment involved this time is also very wide, mainly including:
Smartphones: including iPhone 6S and subsequent models;
Tablets: Includes the fifth generation and subsequent iPads, all iPad Pros, and iPad Air 2;
Computers: Macs running macOS Monterey;
Other: Some models of iPods.
As you can see, it covers almost all the mainstream Apple devices on the market.
Workaround
Speaking of this, some netizens proposed that we are just ordinary people, and there is no information on the mobile phone that is worth hacking and hacking to attack and must obtain.
This sentence seems to me, yes, and not all right.
In fact, hackers collect the private information of ordinary people, causing harm mainly in short-term and long-term aspects. In the short term, they will directly package a large amount of user privacy information and sell it to the "needy" next home, making a lot of money;
In the long run, these private information that has been sold has an impact on our daily lives, such as the previous QQ stolen number, a large number of netizens online "social death"; Some will put our personal safety at risk, such as the harassment of girls living alone in the news before; Some will cause us to suffer property damage, precision fraud, pig killing and even extortion.
Therefore, after Apple released the security vulnerability, it proposed a solution: upgrading the system to iOS 15.6.1 and iPadOS 15.6.1 to plug the vulnerability.
Xiaobian still recommends upgrading it with Apple's friends, and ignoring some "hackers are not interested in us" and other statements. After all, in the Internet era, once the privacy information is leaked, it can never be recovered.
It is not necessary to deify iOS system security
Because iOS is a closed ecosystem, its security has always been a propaganda point that Apple is proud of, and it is also the original intention of many users to join Apple.
However, as an Internet giant, Apple, in addition to this serious security breach, has also been frequently exposed to the use of Siri to listen to user conversations without the user's knowledge, the existence of remote control devices, unauthorized access to protected data vulnerabilities, and the inability to do anything about [Pegasus] software.
Therefore, there is no need to deify the security of the iOS system at all, thinking that it is perfect beyond reproach. In other words, Apple's superiority in privacy is compared to the chaotic Android ecology of previous years.
From the current point of view, with the improvement of users' privacy awareness, a number of Android manufacturers and Internet companies are also working on privacy protection, and the gap with Apple is narrowing.
For example, similar privacy protection functions are launched: Xiaomi white list, OPPO ColorOS system application behavior record; In view of the key area of privacy leakage - instant messaging, the open social platform Bat Secret Chat of domestic security encryption.
It adopts one of the most confidential data transmission technologies recognized internationally: end-to-end encryption technology, which encrypts the data transmission process; In the fields of content encryption, server database security, and key security, we use asymmetric encryption, double ratchet algorithms and other technologies to ensure the security of user chat data.
Finally, whether it is Android or Apple, how to protect user privacy in the current depth of the Development of the Internet will be a major issue related to the lifeline of the product. What do you think about this vulnerability? Welcome to the comments section.