When it comes to providing specific user data, Apple relies on official legal requests from law enforcement and government agencies. However, it turns out that the company may have been duped by some forged requests, and, as a result, provided user data to nefarious individuals.
While Face ID is obviously Apple's go-to biosecurity measure for its high-end devices, Touch ID does technically still live on. And there's certainly no shortage of folks out there in the wild who would like to see the fingerprint-based option make a return for the newest iPhone lineups. And that's been rumored! But maybe we'll have to keep waiting.
Apple has decided it's going to make a pretty big change to the way technicians handle repairing select iPhones. And it should hopefully reduce the number of stolen iPhones the repair personnel are asked to repair. Or at least it will reduce the number of stolen iPhones that get repaired, at least.
When you feel a little bit secretive about certain photos or videos, you can always hide them away in the native Photos app’s dedicated Hidden album. Unfortunately, they won’t be safe from prying eyes when the user knows where to look.
Apple will soon launch a Mac Studio lock adapter to enable customers to physically secure their computer with a third-party lock without damaging it.
All the hubbub lately surrounding kernel vulnerabilities for the iPhone and iPad has been in relation to the now-turned kernel exploit for iOS & iPadOS 15.0-15.1.1. But a fresh announcement shared Wednesday afternoon to Twitter by @Synacktiv is turning quite a few heads.
If you’ve been following along with us as we report on the journey to an iOS & iPadOS 15 jailbreak, then you’ve likely caught wind about Odyssey Team lead developer CoolStar explaining how it will be easier to jailbreak A9-A11-equipped handsets than it will be to do the same with A12 and newer-equipped handsets.
Nearing around two weeks after security researcher @b1n4r1b01 published a working kernel exploit for iOS & iPadOS 15.0-15.1.1 based on Brightiup’s CVE-2021-30955 kernel bug, another respected hacker now appears to be surfacing with an exploit release.
Ever since a kernel-level exploit for iPhones and iPads running iOS & iPadOS 15.0-15.1.1 officially dropped, major players of the jailbreak community have been looking into the feasibility of incorporating it into a public jailbreak. Odyssey Team lead developer CoolStar was among one of the first to publicly acknowledge this, however they also warned about how changes made under the hood would make jailbreaking later firmware on A12 and newer devices more of a challenge.
The Odyssey Team has been investigating the feasibility of the new iOS & iPadOS 15.0-15.1.1 kernel exploit for an upcoming semi-untethered jailbreak tool, and many prospective jailbreakers are undoubtedly anxious to see what happens next.
If you’ve been following the developments surrounding iOS & iPadOS security research lately, then there’s no way you could have missed Brightiup’s CVE-2021-30955 kernel bug for iOS & iPadOS 15.0-15.1.1. Soon after the write-up, hackers and security researchers alike began making proof-of-concepts (PoCs), and later came the full-blown exploit from @b1n4r1b01.
Those closely following the iOS & iPadOS software security sector might remember an iOS & iPadOS 15.0-15.1.1 kernel bug write-up published by Kunlun Lab security researcher @realBrightiup just last week. A day later, Alibaba Security Pandora Lab security researcher @Peterpan980927 showed off a proof-of-concept (PoC) using that write-up as a template.