Feeds

Apple quietly reveals iOS security innards

Cupertino promises "solid protection" against net nasties

5 things you didn’t know about cloud backup

Apple has published a guide to iOS security, detailing in one place the various safeguards that stop perps p0wning fondleslabs and iPhones.

The iOS security model

Apple's diagram of iOS security measures

The guide appears to have landed on Apple.com a couple of weeks ago without fanfare or PR flim-flammery, and opens with the proclamation that “Apple designed the iOS platform with security at its core.”

While we suspect the opposite can only be said for IE6, the guide offers more than chest-puffing. Four sections, one dedicated to architecture, encryption, network security and device access, offer decently comprehensive descriptions of Apple's security approaches without giving away any crown jewels.

A few features that have until now been of little interests beyond the jailbreaking community – such as the Device Firmware Upgrade (DFU) mode – get a formal airing. There's also a lengthy explanation of classes in iOS.

The presence of utterly anodyne passages – there's a basic password primer Reg readers will have memorised in the cradle – and a glossary hint that impressing suits is at least as important as tickling techies down Cupertino way. It's also worth noting that the document is not at all boastful – the conclusion says iOS offers “solid protection against viruses, malware, and other exploits that compromise the security of other platforms.” That's our emphasis there, because it's a long way from the usual hyperbole about security and therefore a little refreshing. ®

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.