Apple says no one using Lockdown Mode has been hacked with spyware (techcrunch.com)

by jbegley 76 comments 107 points
Read article View on HN

76 comments

[−] 827a 49d ago
Trash headline from TechCrunch; the exact statement from Apple was:

> We are not aware of any successful mercenary spyware attacks against a Lockdown Mode-enabled Apple device.

[−] everdrive 49d ago
Good call-out, and it's also nice to see that Apple tried to speak accurately here.
[−] sgbeal 49d ago

> nice to see that Apple tried to speak accurately here.

The key word being "mercenary", which does not rule out first-party spyware.

[−] stephbook 49d ago
So in essence they

- can give away your data for free - get hacked by nation-state such as Iran - get hacked by mercenary spyware and not notice

and their statement would still be correct. Now that's an awful lot of qualifiers. Plus that's just what they say.

[−] jmalicki 49d ago
Mercenary also excludes people do it for funsies and not getting paid.
[−] mulmen 49d ago
Does it also exclude researchers?
[−] calciphus 49d ago
Only if they keep refusing to pay bug bounties!
[−] xingped 48d ago
The wording is weird enough that I have to agree. This is the first time I've ever heard spyware segmented using "mercenary" as a qualifier, which is just insanely suspicious.
[−] Veserv 49d ago
Oh geez. Legal did not give them the go ahead to make the unqualified statement: “We are not aware of any successful spyware attacks” they had to explicitly qualify it with “mercenary”.
[−] varispeed 49d ago
There are more weasel words "we are not aware" - means they actually don't know if such attack was successful, "successful" - what is the definition of success? Maybe attackers got access, but didn't find anything interesting?

Apple is digging itself into a hole.

[−] scottyah 49d ago
I think you are, the words make perfect sense. They know of a lot of attack attempts, and so far they have no reason to believe any were successful. Success can mean a lot of different things, why list it all out (were able to extract data, install malicious software, encrypt files with ransomware, delete any data, etc).
[−] Veserv 49d ago
They have a legal department carefully directing what they say. In a court of law, their lawyers will successfully argue that they are beholden to only the precise letter of their statement. Are you arguing that their lawyers are incompetent and imprecise in their wording? If so, what evidence do you have that their lawyers are incompetent?

In light of the correct legal interpretation of their words, being only the specific letters, we can see that your interpretation is incorrect.

> They know of a lot of attack attempts

No, their statement says nothing about attack attempts.

> so far they have no reason to believe any were successful

No, their statement says nothing about their belief, only their explicit knowledge. Their statement says nothing about their investigation practices or whether they even attempted to investigate and learn about attacks. Their statement says nothing about non-mercenary attacks.

Their statement is technically correct as long as any successful attacks they know about are not explicitly known to be committed by mercenarys.

[−] saghm 49d ago

> No, their statement says nothing about attack attempts.

That's a good point. The best way not to know about any successful attacks is not to know about any of them. I also can definitively state that I'm not aware of any successful attacks, but for obvious reasons this is a basically meaningless statement. Without more data, it's not clear how meaningful the statement they gave is, and while it probably is more meaningful than mine, it doesn't make sense to jump from what they said to "there have definitively been no successful attacks" based on it.

[−] scottyah 49d ago
I'm just going to ignore your entire first paragraph that tries to use hostility to overcome a clear willful misunderstanding, or strong evidence of a recent stroke.

> No, their statement says nothing about attack attempts.

Exactly, they're keeping the statement brief and correct. They have sent multiple batches of notifications to users on previous attacks.

The statement is clear, covers their primary use case for the product, and I'm sure is legally sound. You're grasping at straws trying to think up ways they can be lying to you. I would be very surprised if you ever have used their lockdown mode with any actual cause.

[−] Veserv 49d ago
I am glad that you agree that their legal department’s explicit and intentional exclusion of known successful non-mercenary attacks is precise and legally sound.

It is advisable to not grasp at straws to think up ways that highly paid lawyers are not saying exactly the words they have approved. That is literally their job and they are good at it.

If they meant something more expansive they can do so. It is not the public’s job to do it for them while letting them retreat to the legally binding interpretation at their pleasure.

[−] quantified 49d ago
They can be perfectly aware of nation-state hacks. These are exactly the weasel qualifiers used by the NSA when they were claiming not to be watching the communications of US citizens. "No intercepts were made under program X" specifically sidesteps all the shady stuff under program Y.
[−] sally_glance 49d ago
How do you know their definition isn't only "received extortion letters" and "exfiltrate data" is fine as long as it didn't lead to the former?
[−] varispeed 48d ago

> no reason to believe any were successful.

They have very good reason to believe that - shareholders and public perception. Apple maintains image of their phone being secure and that is far from the truth. As long as general public don't know their phones have holes like Swiss cheese, the shareholders will be happy.

[−] NoMoreNicksLeft 49d ago

>"successful" - what is the definition of success?

At risk of stating the obvious, isn't success "hacked it and no one ever found out (at the time)"? By definition, Apple could probably only be aware of unsuccessful attacks. Though that's not guaranteed either, considering all the myriad failure modes that there must be.

[−] Braxton1980 49d ago
Isn't that assumed? Obviously Apple can't check every iPhone owner to see if they have been hacked now or in the past
[−] mulmen 49d ago
TechCrunch misrepresented Apple's statement.
[−] steve1977 49d ago
No... they can't... obviously...
[−] CGMthrowaway 49d ago
Related somewhat:

> On March 23, 2026, the Hong Kong government changed the implementing rules relating to the National Security Law. It is now a criminal offense to refuse to give the Hong Kong police the passwords or decryption assistance to access all personal electronic devices including cellphones and laptops. This legal change applies to everyone, including U.S. citizens, in Hong Kong, arriving or just transiting Hong Kong International Airport. In addition, the Hong Kong government also has more authority to take and keep any personal devices, as evidence, that they claim are linked to national security offenses.

https://hk.usconsulate.gov/security-alert-2026032601/

[−] seethishat 49d ago
We knew 30 years ago that message attachments (mostly email at that time) were a huge security problem. All those binary file types to parse... what could go wrong ;)

It's good to see Apple's Lockdown mode having such success by simply disabling message attachments.

[−] TheDong 49d ago
I continue to find Lockdown mode frustratingly insulting. Just give me the individual options (too) darnit.

Like "No facetime and message attachments from strangers, no link previews, no device connections", yes, please, I don't want dickpics from strangers.

"No javascript JIT or shared photo albums" no, I actually do want to be able to see friend's albums, and also want my battery to last longer due to optimizing JS.

How hard is it to keep the Lockdown Mode toggle, but also add "no link previews, no facetime calls from strangers, never join insecure wifi networks automatically" as separate option toggles I can turn on if I just want those?

[−] kakacik 49d ago
"with spyware" - a small addition. What about state actors, what about (semi)private israeli companies selling their solutions happily to all regimes regardless of consequences, what about any other kinds of hacks? As an european, by far the biggest threat to me are US state actors.

It would be such a good PR if they could just claim nobody has been hacked, period but I don't see that anywhere.

[−] il-b 49d ago
Would Lockdown Mode improve security in cases where the phone is physically connected to a malicious device, such as one from Cellebrite?
[−] hmokiguess 49d ago
To the best of my knowledge I too am unaware of any one using Lockdown Mode-enabled Apple device.
[−] namegulf 49d ago
It's also confusing.

Are we supposed to enable Lockdown mode always or only we enable manually when we think we're under attack?

According to instructions in settings, it is supposed to be enabled when under attack, isn't it too late already?

What are we missing...

[−] daft_pink 49d ago
I wish I could use Lockdown Mode on my phone, but not on my iPad.

I find Lockdown Mode challenging, because you basically have to use it on every device you own in the Apple ecosystem to have it enabled.

[−] tobyhinloopen 49d ago
how many users are using lockdown mode
[−] ya3r 49d ago
Are we aware of any attacks (or claims of attacks) against any previous version of the iPhone's Lockdown mode?
[−] mulmen 49d ago
I don't see any bears around here. Bear patrol must be working like a charm.
[−] comboy 49d ago
*that we know of
[−] varispeed 49d ago
And how do they know if they for decade apparently didn't know iOS was compromised?

Apple needs to get their shit together and stop gaslighting people.

[−] stotemoat 49d ago
[dead]
[−] kylehotchkiss 49d ago
insert titanic gif here
[−] 2OEH8eoCRo0 49d ago
That's amazing? All ten of them?
[−] cebert 49d ago