Winning by a whisker: revisiting Apple security

Savannah Rowe
5 min readNov 6, 2020

An aura of elegance and prestige surrounds Apple products, thanks to their reputation as privacy and security mercenaries. Building a splendid public image takes time, but preserving such a high status is just as intense.

The classic tale trumpeted across the digital land is that Apple products are impenetrable fortresses, superior to other manufacturers. Personally, I believe that such condescending attitudes don’t help anyone, including Apple.

All shiny beliefs and overall speculations raise the bar that the company must uphold. Hence, each slip and mishap of Apple goes under much more scrutiny from its community and competitors than any other provider.

On the other hand, presumptions on steel-like security are dangerous and silly. With enough motivation, intuition, and technical knowledge, anyone can be hacked. Furthermore, this promotes the sloppy consumer attitude, leaving manufacturers solely in charge of their security.

With the premise set, let’s figure out the main aspects of Apple security and why it might not be that superior as generally pro-claimed. Full disclosure: I nor deny nor agree with Apple to be ahead of the pack. However, I do believe that treating one operating system as indestructible is a far-fetched dream. But let’s observe how these assumptions are born and how they survive in this competitive arena.

How Apple shaped itself as a superior provider

All manufacturers have unique philosophies on how their services operate. macOS (with iOS) are exclusive operating systems that run only on Apple products. We see an opposite approach with Microsoft and Android, as they support dozens of vendors. Naturally, this means that Apple controls a smaller market share. According to statistics, Windows proudly holds over 80%, while macOS occupies only 9.42% of the market. In the mobile world, Android beats iOS: 73% to 26.53%.

Hackers might be many things: vicious, cunning, treacherous, despised, textbook villains. However, they are not wasteful. Economics is a crucial component of successful cyber crimes. It is relatively easy to do the math: Windows and Android dominate the market. More users: more potential victims. As a result, crooks anticipate high returns when focusing on the principal portion of the community. So, in a way, we dictate the hacking trends by opting for specific services and operating systems.

Comparing the bone structure and drawing skeletons out of the closet would lead to an extensive discussion. Experts label technical infrastructures with minimal, razor-thin differences between Apple and other players in the field. Nor macOS nor iOS operate with game-changing security mechanisms. However, there are several quirks worth mentioning:

  • Millions of people choose cracked Windows OS. Windows licenses are expensive, and many people cannot afford to play fair. Luckily (or not), cracked versions come to the rescue. Yes, users can operate them. However, the support is drastically minimal, with the potential of skipping vital updates.
  • macOS is free for all Apple computers. Hence, no need to be sneaky and all users can enjoy official versions, with no unsecured strings attached.
  • Barely anyone would choose to use macOS for non-Apple devices. In theory, macOS can be used on other devices. However, the experience is far from pleasant: buggy and inconvenient.
  • Apple makes it more difficult to install applications from unknown sources. For a person without any technical background, installing unidentified software is challenging.

It seems that Apple simply makes it fairly difficult and impractical for users to misbehave, right?

Why operating systems are not the central factor in security

Blaming all digital life misfortunes on an operating system won’t lead you anywhere. If we were to compare the two front-runners of the market share, both have endured cold-sweat-inducing incidents. For instance, 55 devastating bugs were discovered in Apple services. At the Windows camp, an unnamed vulnerability, already exploited in the wild, made it possible to run malware on Windows 7 and Windows 10.

Everything is all about the individual sitting in front of the computer or staring at a smartphone. For instance, social engineering is just as unforgiving to both parties. Unprotected networks are just as detrimental to your privacy. Most importantly, even a bulletproof operating system won’t save you from the fact that you have reused the same password dozens of times. So, human error is the driving force behind the majority of cyberattacks.

Don’t leave everything to the manufacturer: security tips for all

Any company we associate with has the responsibility to warrant our safety and security. It is the same with government and law enforcement agencies that fight to maintain peace and harmony in our countries or cities. However, we need to be independent and take charge of our digital lives, now more than ever. Let’s breeze through some of the measures you can take to stay on the safe side.

  • Stop pirating or downloading content from unverified sources. The premise here is that hackers can lure victims with the promise of exclusive content. Unknown sources can also participate in malicious attacks that can take subtle forms, such as cryptojacking or malvertising.
  • Use tools for encrypting web traffic and rendering anonymous online. A VPN is a ground-breaking little invention. Despite being privacy-focused, macOS needs a little push. A VPN on macOS devices builds a secure tunnel for all online communications, meaning hackers scratch their heads after being unable to intercept connections. In this era of surveillance and threats, such tools seem vital. But, since the VPN market reflects tremendous growth and stardom, you need to be very vigilant when choosing a provider.
  • Stop jailbreaking your iPhone. As I mentioned earlier, Apple likes to keep its users on a tight leash. This feature is a problem for those craving more freedom and customization options. However, jailbreaking is not the answer, as it can have severe consequences. In iOS environments, apps work in a sandbox, meaning that they do not affect the rest of the system. While this might not pose threats by itself, jailbroken apps could act unpredictably, as far as to download malware. Oh, let’s not forget that jailbreaking revokes your warranties on the affected devices.
  • Do not skip those update pop-ups. This recommendation applies everywhere. Stay vigilant when new patches arrive. In macOS, updating is straightforward. Simply visit the “App Store” and click “Update.”
  • Antivirus tools are NOT things of the past. If you want a smoothly-running device, skipping this step might not end well. Antivirus software informs users of any irregularities and offers regular scans to detect potential threats. Choosing one program might be difficult, but there are many tools on the market for any price range you set.

Brief recap: staying vigilant in era of hacks

Staying overly-focused on an operating system is not healthy. Yes, Apple products arrive at your doorstep with a stronger claim on privacy and security. However, you are the narrator of your story, meaning that your actions determine its ending. Hence, do not neglect the essential recommendations for leading a secure digital lifestyle.

As I mentioned before, hackers frequently exploit people, not technology.

--

--

Savannah Rowe
0 Followers

A curious cat, diving deep into the mechanics of our digital world. Hope to give insightful tips, one article, and a coffee cup at a time!