Pop-Up Thingie

War Ensemble BBS
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Newsgroups
  3. comp.sys.mac.advocacy
  • Yet another iOS Zero-Day Exploit Chain Apple never caught

    From Marian@marianjones@helpfulpeople.com to misc.phone.mobile.iphone,comp.sys.mac.advocacy on Thu Dec 4 21:47:11 2025
    From Newsgroup: comp.sys.mac.advocacy

    Yet another iOS Zero-Day Exploit Chain Apple never caught https://cybersecuritynews.com/ios-zero-day-exploit-chain-leveraged/

    Note that there are so many holes in iOS, that this chain exploited three zero-day holes in a row - which proves Apple is incompetent at QA testing.

    The main reason Apple doesn't catch these is Apple only advertises
    security. There never was security on an iPhone. It's all propaganda.

    This newly disclosed chain of flaws is a chain of three iOS zero-day vulnerabilities that let attackers go from a single Safari link click to
    full spyware control of an iPhone.

    Stage 1 - Safari Remote Code Execution
    Vulnerability: CVE-2023-41993
    Method: Malicious link opened in Safari
    Result: Attacker gains arbitrary read/write access inside Safari process
    Tool: JSKit framework used to run native code

    Stage 2 - Sandbox Escape and Kernel Privilege Escalation
    Vulnerabilities: CVE-2023-41992 and CVE-2023-41991
    Method: Exploit breaks out of Safari sandbox
    Result: Attacker escalates privileges to kernel level
    Codename: PREYHUNTER

    Stage 3 - Spyware Deployment
    Payload: Predator spyware modules
    Components: Helper and Watcher modules
    Capabilities: Record VoIP calls, capture camera and microphone,
    log keystrokes, hide notifications
    Stealth: Stops if security tools or analysis are detected

    Note that the only people who think iOS is secure are people who know
    nothing, especially since Google proved iOS code has NEVER been tested!
    --
    Apple nutcase religious zealot beliefs cannot be supported on facts.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Brock McNuggets@brock.mcnuggets@gmail.com to comp.sys.mac.advocacy,misc.phone.mobile.iphone on Fri Dec 5 12:44:10 2025
    From Newsgroup: comp.sys.mac.advocacy

    On Dec 4, 2025 at 9:47:11 PM MST, "Marian" wrote <10gto4f$202m$1@nnrp.usenet.blueworldhosting.com>:

    Yet another iOS Zero-Day Exploit Chain Apple never caught https://cybersecuritynews.com/ios-zero-day-exploit-chain-leveraged/

    Note that there are so many holes in iOS, that this chain exploited three zero-day holes in a row - which proves Apple is incompetent at QA testing.

    The main reason Apple doesn't catch these is Apple only advertises
    security. There never was security on an iPhone. It's all propaganda.

    This newly disclosed chain of flaws is a chain of three iOS zero-day vulnerabilities that let attackers go from a single Safari link click to
    full spyware control of an iPhone.

    Stage 1 - Safari Remote Code Execution
    Vulnerability: CVE-2023-41993
    Method: Malicious link opened in Safari
    Result: Attacker gains arbitrary read/write access inside Safari process
    Tool: JSKit framework used to run native code

    Stage 2 - Sandbox Escape and Kernel Privilege Escalation
    Vulnerabilities: CVE-2023-41992 and CVE-2023-41991
    Method: Exploit breaks out of Safari sandbox
    Result: Attacker escalates privileges to kernel level
    Codename: PREYHUNTER

    Stage 3 - Spyware Deployment
    Payload: Predator spyware modules
    Components: Helper and Watcher modules
    Capabilities: Record VoIP calls, capture camera and microphone,
    log keystrokes, hide notifications
    Stealth: Stops if security tools or analysis are detected

    Note that the only people who think iOS is secure are people who know nothing, especially since Google proved iOS code has NEVER been tested!

    Yeah, that exploit chain was real — three zero‑days (41993, 41992, 41991) chained together so a single malicious Safari link could lead to full device compromise. Predator spyware used it in the wild. Apple patched the issues
    once researchers disclosed them.

    But that still doesn’t prove the whole platform is worthless. Every major OS has zero‑days, including Android and Chrome. What this shows is the obvious: iOS isn’t magically unbreakable and never has been. Skilled attackers can and do find holes, and patches matter.

    If you’ve got an argument beyond “Apple is incompetent because zero‑days exist,” make it. Otherwise you’re just turning normal security research into a
    conspiracy theory.
    --
    It's impossible for someone who is at war with themselves to be at peace with you.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From badgolferman@REMOVETHISbadgolferman@gmail.com to comp.sys.mac.advocacy,misc.phone.mobile.iphone on Fri Dec 5 08:20:10 2025
    From Newsgroup: comp.sys.mac.advocacy

    On 12/05/2025 07:44, Brock McNuggets wrote:
    If you’ve got an argument beyond “Apple is incompetent because zero‑days
    exist,” make it. Otherwise you’re just turning normal security research into a
    conspiracy theory.

    I think his argument is Apple is no more secure, and maybe less so than
    any other OS despite what people have been told.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Marian@marianjones@helpfulpeople.com to comp.sys.mac.advocacy,misc.phone.mobile.iphone on Fri Dec 5 06:44:05 2025
    From Newsgroup: comp.sys.mac.advocacy

    badgolferman wrote:
    On 12/05/2025 07:44, Brock McNuggets wrote:
    If youve got an argument beyond 'Apple is incompetent because zero-days
    exist,' make it. Otherwise you're just turning normal security research into a
    conspiracy theory.

    I think his argument is Apple is no more secure, and maybe less so than
    any other OS despite what people have been told.

    Bingo!
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Brock McNuggets@brock.mcnuggets@gmail.com to comp.sys.mac.advocacy,misc.phone.mobile.iphone on Fri Dec 5 13:54:09 2025
    From Newsgroup: comp.sys.mac.advocacy

    On Dec 5, 2025 at 6:20:10 AM MST, "badgolferman" wrote <10gum6b$1cno5$1@dont-email.me>:

    On 12/05/2025 07:44, Brock McNuggets wrote:
    If you’ve got an argument beyond “Apple is incompetent because zero‑days
    exist,” make it. Otherwise you’re just turning normal security research into a
    conspiracy theory.

    I think his argument is Apple is no more secure, and maybe less so than
    any other OS despite what people have been told.

    Right... but he has no good evidence to back this, and his view is contrary to evidence. And this has been rehashed... he just runs from it:

    1. https://www.getastra.com/blog/security-audit/malware-statistics/ -- Android devices are 50x more likely to be infected than iOS devices, showing the starkest difference in malware prevalence.

    2. https://www.comparitech.com/blog/vpn-privacy/20-current-android-malware-stats/ -- Android malware attacks reached 33.3 million in 2024; iOS attacks remain very rare.

    3. https://securelist.com/mobile-threat-report-2024/115494/ -- Android is the main target for mobile malware, with Trojan banker attacks up 196%; iOS sees far fewer infections.

    4. https://46745145.fs1.hubspotusercontent-na1.net/hubfs/46745145/MAPS_MTD/REPORT/GEN/Global%20Mobile%20Threat%20Report%202024%20FINAL%20(1).pdf
    -- Android's ecosystem is more broadly exposed to attacks than iOS.

    5. https://www.kaspersky.com/resource-center/threats/android-vs-iphone-mobile-security
    -- Android faces far higher malware volume; both require updates and safe practices.

    6. https://www.qualysec.com/ios-vs-android-security/ -- iOS is more secure by default; Android needs careful management to match safety.

    7. https://www.researchgate.net/publication/370667917_Comparative_Study_of_Information_Security_in_Mobile_Operating_Systems_Android_and_Apple_iOS
    -- iOS has superior information security architecture versus Android.

    8. https://www.researchgate.net/publication/312279414_Security_Evaluation_of_IOS_and_Android/fulltext/587b977308ae4445c06422df/Security-Evaluation-of-IOS-and-Android.pdf
    -- iOS offers better enterprise security; Android requires careful management.

    9. https://www.renemayrhofer.com/courses/android-security/selected-paper/2023/Android_and_iOS_Platform_Security-A_Comparison.pdf
    -- iOS shows stronger hardware and system-level security in 2023-2024.

    10. https://www.approov.io/hubfs/White%20Paper/WP-Comparison%20of%20Apple%2C%20Android%20and%20Huawei%20Mobile%20App%20Security%20v1.0%20FINAL(2).pdf
    -- iOS apps are more secure by default due to App Store restrictions.

    11. https://www.getastra.com/blog/mobile/ios-vs-android-security/ -- iOS's controlled ecosystem reduces malware exposure; Android's openness increases
    the attack surface.

    12. https://www.corrata.com/wp-content/uploads/2018/07/Mobile-Security-Whitepaper-Final-Nov-20112017.pdf
    -- iOS is less susceptible to mass malware; Android's openness increases exposure.

    13. https://www.lookout.com/threat-intelligence/report/q1-2024-mobile-landscape-threat-report
    -- Enterprise spyware targets iOS even though Android dominates overall
    malware volume.

    14. https://www.lookout.com/threat-intelligence/report/q2-2024-mobile-landscape-threat-report
    -- Mobile phishing and malicious web content are rising; iOS is increasingly targeted in enterprise.

    15. https://www.helpnetsecurity.com/2024/12/26/mobile-devices-attacks/ -- iOS faced higher phishing exposure (18.4%) than Android (11.4%), despite Android's higher malware volume.

    16. https://www.cybersecurity-insiders.com/vulnerability-comparison-android-vs-ios-in-the-face-of-cyber-attacks/
    -- Android is more exposed to vulnerabilities, but iOS still faces targeted attacks.

    17. https://arxiv.org/abs/2108.04754 -- Android devices are significantly more prone to persistent malware infections than iOS.

    18. https://arxiv.org/pdf/2105.12613 -- iOS offers stronger protection against unauthorized access; Android needs extra management.

    19. https://arxiv.org/pdf/2109.13722 -- Both OSes have privacy/data collection issues; Android apps are more likely to leak sensitive information.

    20. https://petsymposium.org/popets/2024/popets-2024-0047.pdf -- iOS privacy labels are slightly more effective than Android in helping users understand data collection.

    21. https://www.promon.io/security-news/android-vs-ios-security -- Security depends more on user behavior, patching, and configuration than OS alone.

    22. https://www.norton.com/blog/mobile/android-vs-ios-which-is-more-secure -- iOS generally offers stronger default security; user behavior is the main risk on both platforms.

    23. https://www.verizon.com/business/resources/Tc13/reports/2024-mobile-security-index.pdf
    -- Android is riskier in enterprise without strong management; mobile devices remain key breach vectors.

    24. https://lp.zimperium.com/hubfs/Reports/2025%20Global%20Mobile%20Threat%20Report.pdf
    -- Sideloaded apps and older Android devices greatly increase enterprise risk; iOS risk comes mostly from targeted attacks.
    --
    It's impossible for someone who is at war with themselves to be at peace with you.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Brock McNuggets@brock.mcnuggets@gmail.com to comp.sys.mac.advocacy,misc.phone.mobile.iphone on Fri Dec 5 13:54:48 2025
    From Newsgroup: comp.sys.mac.advocacy

    On Dec 5, 2025 at 6:44:05 AM MST, "Marian" wrote <10gunj5$2f8d$1@nnrp.usenet.blueworldhosting.com>:

    badgolferman wrote:
    On 12/05/2025 07:44, Brock McNuggets wrote:
    If you’ve got an argument beyond 'Apple is incompetent because zero-days >>> exist,' make it. Otherwise you're just turning normal security research into a
    conspiracy theory.

    I think his argument is Apple is no more secure, and maybe less so than
    any other OS despite what people have been told.

    Bingo!

    And your view is contrary to evidence. On being shown these you run and make false claims about what is being said.

    1. https://www.getastra.com/blog/security-audit/malware-statistics/ -- Android devices are 50x more likely to be infected than iOS devices, showing the starkest difference in malware prevalence.

    2. https://www.comparitech.com/blog/vpn-privacy/20-current-android-malware-stats/ -- Android malware attacks reached 33.3 million in 2024; iOS attacks remain very rare.

    3. https://securelist.com/mobile-threat-report-2024/115494/ -- Android is the main target for mobile malware, with Trojan banker attacks up 196%; iOS sees far fewer infections.

    4. https://46745145.fs1.hubspotusercontent-na1.net/hubfs/46745145/MAPS_MTD/REPORT/GEN/Global%20Mobile%20Threat%20Report%202024%20FINAL%20(1).pdf
    -- Android's ecosystem is more broadly exposed to attacks than iOS.

    5. https://www.kaspersky.com/resource-center/threats/android-vs-iphone-mobile-security
    -- Android faces far higher malware volume; both require updates and safe practices.

    6. https://www.qualysec.com/ios-vs-android-security/ -- iOS is more secure by default; Android needs careful management to match safety.

    7. https://www.researchgate.net/publication/370667917_Comparative_Study_of_Information_Security_in_Mobile_Operating_Systems_Android_and_Apple_iOS
    -- iOS has superior information security architecture versus Android.

    8. https://www.researchgate.net/publication/312279414_Security_Evaluation_of_IOS_and_Android/fulltext/587b977308ae4445c06422df/Security-Evaluation-of-IOS-and-Android.pdf
    -- iOS offers better enterprise security; Android requires careful management.

    9. https://www.renemayrhofer.com/courses/android-security/selected-paper/2023/Android_and_iOS_Platform_Security-A_Comparison.pdf
    -- iOS shows stronger hardware and system-level security in 2023-2024.

    10. https://www.approov.io/hubfs/White%20Paper/WP-Comparison%20of%20Apple%2C%20Android%20and%20Huawei%20Mobile%20App%20Security%20v1.0%20FINAL(2).pdf
    -- iOS apps are more secure by default due to App Store restrictions.

    11. https://www.getastra.com/blog/mobile/ios-vs-android-security/ -- iOS's controlled ecosystem reduces malware exposure; Android's openness increases
    the attack surface.

    12. https://www.corrata.com/wp-content/uploads/2018/07/Mobile-Security-Whitepaper-Final-Nov-20112017.pdf
    -- iOS is less susceptible to mass malware; Android's openness increases exposure.

    13. https://www.lookout.com/threat-intelligence/report/q1-2024-mobile-landscape-threat-report
    -- Enterprise spyware targets iOS even though Android dominates overall
    malware volume.

    14. https://www.lookout.com/threat-intelligence/report/q2-2024-mobile-landscape-threat-report
    -- Mobile phishing and malicious web content are rising; iOS is increasingly targeted in enterprise.

    15. https://www.helpnetsecurity.com/2024/12/26/mobile-devices-attacks/ -- iOS faced higher phishing exposure (18.4%) than Android (11.4%), despite Android's higher malware volume.

    16. https://www.cybersecurity-insiders.com/vulnerability-comparison-android-vs-ios-in-the-face-of-cyber-attacks/
    -- Android is more exposed to vulnerabilities, but iOS still faces targeted attacks.

    17. https://arxiv.org/abs/2108.04754 -- Android devices are significantly more prone to persistent malware infections than iOS.

    18. https://arxiv.org/pdf/2105.12613 -- iOS offers stronger protection against unauthorized access; Android needs extra management.

    19. https://arxiv.org/pdf/2109.13722 -- Both OSes have privacy/data collection issues; Android apps are more likely to leak sensitive information.

    20. https://petsymposium.org/popets/2024/popets-2024-0047.pdf -- iOS privacy labels are slightly more effective than Android in helping users understand data collection.

    21. https://www.promon.io/security-news/android-vs-ios-security -- Security depends more on user behavior, patching, and configuration than OS alone.

    22. https://www.norton.com/blog/mobile/android-vs-ios-which-is-more-secure -- iOS generally offers stronger default security; user behavior is the main risk on both platforms.

    23. https://www.verizon.com/business/resources/Tc13/reports/2024-mobile-security-index.pdf
    -- Android is riskier in enterprise without strong management; mobile devices remain key breach vectors.

    24. https://lp.zimperium.com/hubfs/Reports/2025%20Global%20Mobile%20Threat%20Report.pdf
    -- Sideloaded apps and older Android devices greatly increase enterprise risk; iOS risk comes mostly from targeted attacks.
    --
    It's impossible for someone who is at war with themselves to be at peace with you.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Jolly Roger@jollyroger@pobox.com to comp.sys.mac.advocacy,misc.phone.mobile.iphone on Fri Dec 5 17:43:26 2025
    From Newsgroup: comp.sys.mac.advocacy

    On 2025-12-05, badgolferman <REMOVETHISbadgolferman@gmail.com> wrote:
    On 12/05/2025 07:44, Brock McNuggets wrote:
    If you’ve got an argument beyond “Apple is incompetent because
    zero‑days exist,” make it. Otherwise you’re just turning normal
    security research into a conspiracy theory.

    I think his argument is Apple is no more secure, and maybe less so
    than any other OS despite what people have been told.

    That argument is bullshit. No surprise you're backing it.
    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Chris@ithinkiam@gmail.com to misc.phone.mobile.iphone,comp.sys.mac.advocacy on Fri Dec 5 20:35:36 2025
    From Newsgroup: comp.sys.mac.advocacy

    badgolferman <REMOVETHISbadgolferman@gmail.com> wrote:
    On 12/05/2025 07:44, Brock McNuggets wrote:
    If you’ve got an argument beyond “Apple is incompetent because zero‑days
    exist,” make it. Otherwise you’re just turning normal security research into a
    conspiracy theory.

    I think his argument is Apple is no more secure, and maybe less so than
    any other OS despite what people have been told.

    That may be his argument. Yet all he has are anecdotes, hyperbole and cherry-picked information.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Your Name@YourName@YourISP.com to misc.phone.mobile.iphone,comp.sys.mac.advocacy on Sat Dec 6 11:00:09 2025
    From Newsgroup: comp.sys.mac.advocacy

    On 2025-12-05 12:44:10 +0000, Brock McNuggets said:

    On Dec 4, 2025 at 9:47:11 PM MST, "Marian" wrote <10gto4f$202m$1@nnrp.usenet.blueworldhosting.com>:

    Yet another iOS Zero-Day Exploit Chain Apple never caught
    https://cybersecuritynews.com/ios-zero-day-exploit-chain-leveraged/

    Note that there are so many holes in iOS, that this chain exploited three
    zero-day holes in a row - which proves Apple is incompetent at QA testing. >>
    The main reason Apple doesn't catch these is Apple only advertises
    security. There never was security on an iPhone. It's all propaganda.

    This newly disclosed chain of flaws is a chain of three iOS zero-day
    vulnerabilities that let attackers go from a single Safari link click to
    full spyware control of an iPhone.

    Stage 1 - Safari Remote Code Execution
    Vulnerability: CVE-2023-41993
    Method: Malicious link opened in Safari
    Result: Attacker gains arbitrary read/write access inside Safari process
    Tool: JSKit framework used to run native code

    Stage 2 - Sandbox Escape and Kernel Privilege Escalation
    Vulnerabilities: CVE-2023-41992 and CVE-2023-41991
    Method: Exploit breaks out of Safari sandbox
    Result: Attacker escalates privileges to kernel level
    Codename: PREYHUNTER

    Stage 3 - Spyware Deployment
    Payload: Predator spyware modules
    Components: Helper and Watcher modules
    Capabilities: Record VoIP calls, capture camera and microphone,
    log keystrokes, hide notifications
    Stealth: Stops if security tools or analysis are detected

    Note that the only people who think iOS is secure are people who know
    nothing, especially since Google proved iOS code has NEVER been tested!

    Yeah, that exploit chain was real — three zero‑days (41993, 41992, 41991) chained together so a single malicious Safari link could lead to full device compromise. Predator spyware used it in the wild. Apple patched the issues once researchers disclosed them.

    But that still doesn’t prove the whole platform is worthless. Every major OS
    has zero‑days, including Android and Chrome. What this shows is the obvious:
    iOS isn’t magically unbreakable and never has been. Skilled attackers can and
    do find holes, and patches matter.

    If you’ve got an argument beyond “Apple is incompetent because zero‑days
    exist,” make it. Otherwise you’re just turning normal security research into a
    conspiracy theory.

    There's also the fact that 99.9% of these supposed malware problems are theoreticcal and reported by companies who sell anti-malware software
    ... big surpise, NOT! Almost none have have ever been found on anyone's
    actual device in the real world, even before being fixed by a security
    patch.


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Jolly Roger@jollyroger@pobox.com to misc.phone.mobile.iphone,comp.sys.mac.advocacy on Fri Dec 5 22:17:58 2025
    From Newsgroup: comp.sys.mac.advocacy

    On 2025-12-05, Chris <ithinkiam@gmail.com> wrote:
    badgolferman <REMOVETHISbadgolferman@gmail.com> wrote:
    On 12/05/2025 07:44, Brock McNuggets wrote:
    If you’ve got an argument beyond “Apple is incompetent because zero‑days
    exist,” make it. Otherwise you’re just turning normal security research into a
    conspiracy theory.

    I think his argument is Apple is no more secure, and maybe less so than
    any other OS despite what people have been told.

    That may be his argument. Yet all he has are anecdotes, hyperbole and cherry-picked information.

    badgolferman knows that - he doesn't care. He's all in on Arlen's weak
    trolls.
    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Marian@marianjones@helpfulpeople.com to misc.phone.mobile.iphone,comp.sys.mac.advocacy on Sat Dec 6 10:37:20 2025
    From Newsgroup: comp.sys.mac.advocacy

    Chris wrote:
    I think his argument is Apple is no more secure, and maybe less so than
    any other OS despite what people have been told.

    That may be his argument.

    It is my argument.

    Yet all he has are anecdotes, hyperbole and cherry-picked information.

    <https://www.cs.umd.edu/~dml/papers/wifi-surveillance-sp24.pdf>
    "In this work, we show that Apples WPS implementation
    can easily be abused to create a serious privacy threat
    on a global scale."

    <https://arxiv.org/abs/2405.14975>
    "In this work, we show that Apple's flawed WPS can too easily be abused"

    <https://www.govinfosecurity.com/surveillance-risk-apples-wifi-based-positioning-system-a-25330>
    "The attack risk stems from Apple's WiFi-based Positioning System, or WPS"

    <https://securityboulevard.com/2024/05/apple-wi-fi-location-privacy-richixbw/>
    "An unrestricted Apple API endpoint allows for easy tracking."

    <https://cybernews.com/privacy/apple-beams-wifi-location-data-privacy-risk/>
    "Anyone can exploit Apple's flawed WiFi-based positioning system (WPS)*

    <https://www.macworld.com/article/2343297/apple-wi-fi-network-wps-vulnerability-location-services-leak.html>
    "Researchers have discovered a crucial vulnerability
    in the way only Apple's location services work"

    <https://www.theregister.com/2024/05/23/apple_wifi_positioning_system/>
    "The threat applies even to users that do not own devices
    for which the WPSes are designed - individuals who own no Apple
    products, for instance, can have their AP in Apple's WPS merely
    by having Apple devices come within Wi-Fi transmission range."

    <https://9to5mac.com/2024/05/24/apple-location-services-vulnerability/>
    "There is one crucial difference between the way in which
    Apple and Google devices carry out this task
    and that's exactly where the privacy issue arises."
    "We need to understand Apple devices figure out locations differently"

    <https://www.bizcommunity.com/article/apple-may-have-turned-wi-fi-routers-into-a-privacy-threat-239637a>
    "Researchers from the University of Maryland have uncovered a
    significant privacy vulnerability in Apple's Wi-Fi-based
    Positioning System (WPS). This vulnerability enables attackers
    to track devices globally by exploiting the way Apple's WPS
    operates, raising serious privacy concerns."

    <https://cyberinsider.com/apples-wi-fi-based-positioning-system-is-a-privacy-nightmare/>
    *Apple's Wi-Fi-Based Positioning System is a Privacy Nightmare*
    "Researchers from the University of Maryland have uncovered a
    significant privacy vulnerability in Apple's Wi-Fi-based Positioning
    System (WPS). This vulnerability enables attackers to track devices
    globally by exploiting the way Apple's WPS operates, raising
    serious privacy concerns."
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Brock McNuggets@brock.mcnuggets@gmail.com to comp.sys.mac.advocacy,misc.phone.mobile.iphone on Sat Dec 6 20:18:07 2025
    From Newsgroup: comp.sys.mac.advocacy

    On Dec 6, 2025 at 10:37:20 AM MST, "Marian" wrote <10h1pkf$4um$1@nnrp.usenet.blueworldhosting.com>:

    Chris wrote:
    I think his argument is Apple is no more secure, and maybe less so than
    any other OS despite what people have been told.

    That may be his argument.

    It is my argument.

    Cool. But it is not one you can support.

    Yet all he has are anecdotes, hyperbole and cherry-picked information.

    <https://www.cs.umd.edu/~dml/papers/wifi-surveillance-sp24.pdf>
    "In this work, we show that Apples WPS implementation
    can easily be abused to create a serious privacy threat
    on a global scale."

    <https://arxiv.org/abs/2405.14975>
    "In this work, we show that Apple's flawed WPS can too easily be abused"


    <https://www.govinfosecurity.com/surveillance-risk-apples-wifi-based-positioning-system-a-25330>
    "The attack risk stems from Apple's WiFi-based Positioning System, or WPS"

    <https://securityboulevard.com/2024/05/apple-wi-fi-location-privacy-richixbw/>
    "An unrestricted Apple API endpoint allows for easy tracking."

    <https://cybernews.com/privacy/apple-beams-wifi-location-data-privacy-risk/>
    "Anyone can exploit Apple's flawed WiFi-based positioning system (WPS)*


    <https://www.macworld.com/article/2343297/apple-wi-fi-network-wps-vulnerability-location-services-leak.html>
    "Researchers have discovered a crucial vulnerability
    in the way only Apple's location services work"

    <https://www.theregister.com/2024/05/23/apple_wifi_positioning_system/>
    "The threat applies even to users that do not own devices
    for which the WPSes are designed - individuals who own no Apple
    products, for instance, can have their AP in Apple's WPS merely
    by having Apple devices come within Wi-Fi transmission range."

    <https://9to5mac.com/2024/05/24/apple-location-services-vulnerability/>
    "There is one crucial difference between the way in which
    Apple and Google devices carry out this task
    and that's exactly where the privacy issue arises."
    "We need to understand Apple devices figure out locations differently"


    <https://www.bizcommunity.com/article/apple-may-have-turned-wi-fi-routers-into-a-privacy-threat-239637a>
    "Researchers from the University of Maryland have uncovered a
    significant privacy vulnerability in Apple's Wi-Fi-based
    Positioning System (WPS). This vulnerability enables attackers
    to track devices globally by exploiting the way Apple's WPS
    operates, raising serious privacy concerns."


    <https://cyberinsider.com/apples-wi-fi-based-positioning-system-is-a-privacy-nightmare/>
    *Apple's Wi-Fi-Based Positioning System is a Privacy Nightmare*
    "Researchers from the University of Maryland have uncovered a
    significant privacy vulnerability in Apple's Wi-Fi-based Positioning
    System (WPS). This vulnerability enables attackers to track devices
    globally by exploiting the way Apple's WPS operates, raising
    serious privacy concerns."

    None of that backs the claim... they show Apple's OSs are not perfect -- but nobody said they were. Your claim is iOS is no more secure than Android, and that claim is contrary to the evidence:

    1. https://www.getastra.com/blog/security-audit/malware-statistics/ -- Android devices are 50x more likely to be infected than iOS devices, showing the starkest difference in malware prevalence.

    2. https://www.comparitech.com/blog/vpn-privacy/20-current-android-malware-stats/ -- Android malware attacks reached 33.3 million in 2024; iOS attacks remain very rare.

    3. https://securelist.com/mobile-threat-report-2024/115494/ -- Android is the main target for mobile malware, with Trojan banker attacks up 196%; iOS sees far fewer infections.

    4. https://46745145.fs1.hubspotusercontent-na1.net/hubfs/46745145/MAPS_MTD/REPORT/GEN/Global%20Mobile%20Threat%20Report%202024%20FINAL%20(1).pdf
    -- Android's ecosystem is more broadly exposed to attacks than iOS.

    5. https://www.kaspersky.com/resource-center/threats/android-vs-iphone-mobile-security
    -- Android faces far higher malware volume; both require updates and safe practices.

    6. https://www.qualysec.com/ios-vs-android-security/ -- iOS is more secure by default; Android needs careful management to match safety.

    7. https://www.researchgate.net/publication/370667917_Comparative_Study_of_Information_Security_in_Mobile_Operating_Systems_Android_and_Apple_iOS
    -- iOS has superior information security architecture versus Android.

    8. https://www.researchgate.net/publication/312279414_Security_Evaluation_of_IOS_and_Android/fulltext/587b977308ae4445c06422df/Security-Evaluation-of-IOS-and-Android.pdf
    -- iOS offers better enterprise security; Android requires careful management.

    9. https://www.renemayrhofer.com/courses/android-security/selected-paper/2023/Android_and_iOS_Platform_Security-A_Comparison.pdf
    -- iOS shows stronger hardware and system-level security in 2023-2024.

    10. https://www.approov.io/hubfs/White%20Paper/WP-Comparison%20of%20Apple%2C%20Android%20and%20Huawei%20Mobile%20App%20Security%20v1.0%20FINAL(2).pdf
    -- iOS apps are more secure by default due to App Store restrictions.

    11. https://www.getastra.com/blog/mobile/ios-vs-android-security/ -- iOS's controlled ecosystem reduces malware exposure; Android's openness increases
    the attack surface.

    12. https://www.corrata.com/wp-content/uploads/2018/07/Mobile-Security-Whitepaper-Final-Nov-20112017.pdf
    -- iOS is less susceptible to mass malware; Android's openness increases exposure.

    13. https://www.lookout.com/threat-intelligence/report/q1-2024-mobile-landscape-threat-report
    -- Enterprise spyware targets iOS even though Android dominates overall
    malware volume.

    14. https://www.lookout.com/threat-intelligence/report/q2-2024-mobile-landscape-threat-report
    -- Mobile phishing and malicious web content are rising; iOS is increasingly targeted in enterprise.

    15. https://www.helpnetsecurity.com/2024/12/26/mobile-devices-attacks/ -- iOS faced higher phishing exposure (18.4%) than Android (11.4%), despite Android's higher malware volume.

    16. https://www.cybersecurity-insiders.com/vulnerability-comparison-android-vs-ios-in-the-face-of-cyber-attacks/
    -- Android is more exposed to vulnerabilities, but iOS still faces targeted attacks.

    17. https://arxiv.org/abs/2108.04754 -- Android devices are significantly more prone to persistent malware infections than iOS.

    18. https://arxiv.org/pdf/2105.12613 -- iOS offers stronger protection against unauthorized access; Android needs extra management.

    19. https://arxiv.org/pdf/2109.13722 -- Both OSes have privacy/data collection issues; Android apps are more likely to leak sensitive information.

    20. https://petsymposium.org/popets/2024/popets-2024-0047.pdf -- iOS privacy labels are slightly more effective than Android in helping users understand data collection.

    21. https://www.promon.io/security-news/android-vs-ios-security -- Security depends more on user behavior, patching, and configuration than OS alone.

    22. https://www.norton.com/blog/mobile/android-vs-ios-which-is-more-secure -- iOS generally offers stronger default security; user behavior is the main risk on both platforms.

    23. https://www.verizon.com/business/resources/Tc13/reports/2024-mobile-security-index.pdf
    -- Android is riskier in enterprise without strong management; mobile devices remain key breach vectors.

    24. https://lp.zimperium.com/hubfs/Reports/2025%20Global%20Mobile%20Threat%20Report.pdf
    -- Sideloaded apps and older Android devices greatly increase enterprise risk; iOS risk comes mostly from targeted attacks.
    --
    It's impossible for someone who is at war with themselves to be at peace with you.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • Who's Online

  • Recent Visitors

    • Ptb1970
      Sat Dec 13 17:34:42 2025
      from Wisconsin via Telnet
    • Microbot
      Sat Dec 13 17:04:31 2025
      from Moore, Ok via Telnet
    • John F Kennedy
      Fri Dec 12 21:48:00 2025
      from Crazyworldbbs.Com:2323 via Telnet
    • Microbot
      Fri Dec 12 18:16:00 2025
      from Moore, Ok via Telnet
  • System Info

    Sysop: DaiTengu
    Location: Appleton, WI
    Users: 1,089
    Nodes: 10 (0 / 10)
    Uptime: 153:50:24
    Calls: 13,921
    Calls today: 2
    Files: 187,021
    D/L today: 3,754 files
    (944M bytes)
    Messages: 2,457,163

© War Ensemble BBS, 2025