Feeds

Apple quietly reveals iOS security innards

Cupertino promises "solid protection" against net nasties

The Essential Guide to IT Transformation

Apple has published a guide to iOS security, detailing in one place the various safeguards that stop perps p0wning fondleslabs and iPhones.

The iOS security model

Apple's diagram of iOS security measures

The guide appears to have landed on Apple.com a couple of weeks ago without fanfare or PR flim-flammery, and opens with the proclamation that “Apple designed the iOS platform with security at its core.”

While we suspect the opposite can only be said for IE6, the guide offers more than chest-puffing. Four sections, one dedicated to architecture, encryption, network security and device access, offer decently comprehensive descriptions of Apple's security approaches without giving away any crown jewels.

A few features that have until now been of little interests beyond the jailbreaking community – such as the Device Firmware Upgrade (DFU) mode – get a formal airing. There's also a lengthy explanation of classes in iOS.

The presence of utterly anodyne passages – there's a basic password primer Reg readers will have memorised in the cradle – and a glossary hint that impressing suits is at least as important as tickling techies down Cupertino way. It's also worth noting that the document is not at all boastful – the conclusion says iOS offers “solid protection against viruses, malware, and other exploits that compromise the security of other platforms.” That's our emphasis there, because it's a long way from the usual hyperbole about security and therefore a little refreshing. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.