Beautiful Virgin Islands

Saturday, Aug 16, 2025

We can make our phones harder to hack but complete security is a pipe dream

We can make our phones harder to hack but complete security is a pipe dream

Even the latest iPhone scare won’t persuade us to choose safety over convenience
Apple caused a stir a few weeks ago when it announced that the forthcoming update of its mobile and laptop operating systems would contain an optional high-security mode that would provide users with an unprecedented level of protection against powerful “spyware” software that surreptitiously obtains control of their devices.

It’s called Lockdown Mode and, according to Apple, “offers an extreme, optional level of security for the very few users who, because of who they are or what they do, may be personally targeted by some of the most sophisticated digital threats, such as those from NSO Group and other private companies developing state-sponsored mercenary spyware”.

Lockdown is effectively an alternative operating system mode. To turn it on, go to settings, choose it and restart your device. When you do, you find yourself with a rather different iPhone. Browsing the web is clunkier, for example, because Lockdown blocks many of the speed and efficiency tricks that Safari uses to render web pages. Some complex but widely used web technologies, like so-called just-in-time JavaScript compilation, which allow websites to run programs inside your browser, are disabled unless you specifically exclude a website from restriction. Still, more people might be persuaded to plump for greater security after vulnerabilities were revealed on Apple devices.

Lockdown also limits all kinds of incoming invitations and requests (for example, from FaceTime) unless you have specifically asked for them. In messages, the phone won’t show link previews and will block all attachments with the exception of a few standard image formats. Nor will it allow access to anything physically plugged into it. And so on.

The result of engaging Lockdown is that you have an iPhone that is more secure but less convenient to use. And, in a way, that is the most significant thing about Apple’s decision. As the security guru Bruce Schneier puts it: “It’s common to trade security off for usability and the results of that are all over Apple’s operating systems – and everywhere else on the internet. What they’re doing with Lockdown Mode is the reverse: they’re trading usability for security. The result is a user experience with fewer features, but a much smaller attack surface. And they aren’t just removing random features; they’re removing features that are common attack vectors.”

Ever since people started to worry about computer safety, the issue has been framed as striking a balance between security and convenience. Up to now, convenience has been winning hands down. Take passwords. Everyone knows that long, complex passwords are more secure than simple ones, but they’re also hard to remember. So, being human, we don’t use them: in 2021, the five most commonly used passwords were: 123456, 123456789, 12345, qwerty and password.

In the era of mainframe computers and standalone PCs, this kind of laxity didn’t matter too much. But as the world became networked, the consequences of carelessness have become more worrying. Why? Because there is no such thing as a completely secure networked device and we have been adding such devices to the so-called Internet of Things (IoT) on a maniacal scale. There are something like 13bn at the moment; by 2030, the tech industry thinks there might be 30bn.

The conventional adjective for these gizmos is “smart”. They can be “hi-tech” items such as smart speakers, fitness trackers and security cameras, but also standard household things such as fridges, lightbulbs and plugs, doorbells, thermostats and so on. From a marketing point of view, their USPs are flexibility, utility and responsiveness – in other words, convenience.

But smart is a euphemism that tactfully conceals the fact that they are tiny computers that are connected to the internet and can be remotely controlled from a smartphone or a computer. Some are made by reputable companies, but many are products of small outfits in China and elsewhere. They come with default usernames and passwords (such as “admin” and “password”) that buyers can change (but usually don’t). Because they’re networked, they are remotely accessible by their owners and, more importantly, by others. And there are billions of them out there in our homes, offices and factories.

Security researchers use the term “attack surface” to describe the number of possible points where an unauthorised user can access a system, extract data and/or inflict damage. The smaller the surface, the easier it is to protect. Unfortunately, the corollary also holds. In our Gadarene rush into the Internet of Things we are creating an attack surface of near-infinite dimensions.

The strange thing is that we already know what the consequences of this are like and yet seem unperturbed by them. In 2016, the security community was transfixed by a number of huge distributed denial-of-service attacks that caused outages, internet congestion and in one case overwhelmed the website of a prominent security guru.

Such attacks used to be conducted by botnets of thousands of infected PCs but the 2016 ones were carried out by a botnet that included perhaps half-a-million infected “smart” gizmos. The Mirai malware that assembled the botnet scoured the web for IoT devices protected by little more than factory-default usernames and passwords and then enlisted them in attacks that hurled junk traffic at an online target until it could no longer function.

Mirai is still around, so you might not be the only entity benefiting from those fancy new networked lightbulbs. The cost of convenience will be higher than we think. So upgrade those passwords.
#NSO 
Newsletter

Related Articles

Beautiful Virgin Islands
0:00
0:00
Close
High-Stakes Trump-Putin Summit on Ukraine Underway in Alaska
The World Economic Forum has cleared Klaus Schwab of “material wrongdoing” after a law firm conducted a review into potential misconduct of the institution’s founder
The Mystery Captivating the Internet: Where Has the Social Media Star Gone?
Man Who Threw Sandwich at Federal Agents in Washington Charged with Assault – Identified as Justice Department Employee
A Computer That Listens, Sees, and Acts: What to Expect from Windows 12
Iranian Protection Offers Chinese Vehicle Shipments a Cost Advantage over Japanese and Korean Makers
UK has added India to a list of countries whose nationals, convicted of crimes, will face immediate deportation without the option to appeal from within the UK
Southwest Airlines Apologizes After 'Accidentally Forgetting' Two Blind Passengers at New Orleans Airport and Faces Criticism Over Poor Service for Passengers with Disabilities
Russian Forces Advance on Donetsk Front, Cutting Key Supply Routes Near Pokrovsk
It’s Not the Algorithm: New Study Claims Social Networks Are Fundamentally Broken
Sixty-Year-Old Claims: “My Biological Age Is Twenty-One.” Want the Same? Remember the Name Spermidine
Saudi Arabia accelerates renewables to curb domestic oil use
U.S. Investigation Reports No Russian Interference in Romanian Election First Round
Oasis Reunion Tour Linked to Temporary Rise in UK Inflation
Musk Alleges Apple Favors OpenAI in App Store Rankings
Denmark Revives EU ‘Chat Control’ Proposal for Encrypted Message Scanning
US Teen Pilot Reaches Deal to Leave Chile After Unauthorized Antarctic Landing
Trump considers lawsuit against Powell over Fed renovation costs
Trump Criticizes Goldman Sachs Over Tariff Cost Forecasts
Perplexity makes unsolicited $34.5 billion all-cash offer for Google’s Chrome browser
Kodak warns of liquidity crisis as debt obligations loom
Cristiano Ronaldo and Georgina Rodríguez announce engagement
Taylor Swift announces 12th studio album on Travis Kelce’s podcast after high-profile year together
South Korean court orders arrest of former First Lady Kim Keon Hee on bribery and corruption allegations
Asia-Pacific dominates world’s busiest flight routes, with South Korea’s Jeju–Seoul corridor leading global rankings
Private Welsh island with 19th-century fort listed for sale at over £3 million
JD Vance to meet Tory MP Robert Jenrick and Reform’s Nigel Farage on UK visit
Trump and Putin Meeting: Focus on Listening and Communication
Instagram Released a New Feature – and Sent Users Into a Panic
China Accuses: Nvidia Chips Are U.S. Espionage Tools
Mercedes’ CEO Is Killing Germany’s Auto Legacy
Trump Proposes Land Concessions to End Ukraine War
New Road Safety Measures Proposed in the UK: Focus on Eye Tests and Stricter Drink-Driving Limits
Viktor Orbán Criticizes EU's Financial Support for Ukraine Amid Economic Concerns
South Korea's Military Shrinks by 20% Amid Declining Birthrate
US Postal Service Targets Unregulated Vape Distributors in Crackdown
Duluth International Airport Running on Tech Older Than Your Grandmother's Vinyl Player
RFK Jr. Announces HHS Investigation into Big Pharma Incentives to Doctors
Australia to Recognize the State of Palestine at UN Assembly
The Collapse of the Programmer Dream: AI Experts Now the Real High-Earners
Security flaws in a carmaker’s web portal let one hacker remotely unlock cars from anywhere
Street justice isn’t pretty but how else do you deal with this kind of insanity? Sometimes someone needs to standup and say something
Armenia and Azerbaijan sign U.S.-brokered accord at White House outlining transit link via southern Armenia
Barcelona Resolves Captaincy Issue with Marc-André ter Stegen
US Justice Department Seeks Release of Epstein and Maxwell Grand Jury Exhibits Amid Legal and Victim Challenges
Trump Urges Intel CEO Lip-Bu Tan to Resign Over Alleged Chinese Business Ties
Scotland’s First Minister Meets Trump Amid Visit Highlighting Whisky Tariffs, Gaza Crisis and Heritage Links
Trump Administration Increases Reward for Arrest of Venezuelan President Maduro to Fifty Million Dollars
Armenia and Azerbaijan to Sign US-Brokered Framework Agreement for Nakhchivan Corridor
British Labour Government Utilizes Counter-Terrorism Tools for Social Media Monitoring Against Legitimate Critics
×