Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

High-level targets (for whom this mode is specifically advertised) are likely aware of the dangers of installing apps.

Enterprise-signed apps require an explicit (and non-obvious) action from the user when running for the first time.



> High-level targets (for whom this mode is specifically advertised) are likely aware of the dangers of installing apps.

I firstly don't believe this is true at all, plenty of high-level targets are not tech savvy; but more to the point of Lockdown mode, you could then say the same thing about most of its other features ("High-level targets are likely to already be aware of the dangers of doing $thing_Lockdown_prevents").


The features lockdown mode disabled are used in 0- and 1-click attacks. Installing an enterprise app is somewhat different.


The whole benefit of the iOS App Store system is that those apps can't be malicious.

This requires an atypical install/launch process that you'd hopefully trigger some sense of "this isn't right" - similar to the macOS complaints when you choose to run an unsigned app.


The ‘high level target’ or person of interest thing is slightly absurd. Everyone is a person of interest and security shouldn’t be only for the domain of journalists, activists, dissidents etc




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: