Unencrypted Kernel Code - OOPSE! Apple left it intentionaly

Unencrypted Kernel Code - OOPSE! Apple left it intentionaly

Unencrypted Kernel Code - OOPSE! Apple left it intentionaly

It will also be safer to try on iOS based devices like the iPad or iPhone, because by that time, developers will have spotted all of its major bugs and problems and Apple will have made the proper modifications. At the time, we weren't sure if this was done purposefully, or if it was a human error and that it would be corrected in the forthcoming betas of iOS 10. If you do not want to apply for Apple's developer account and still like to try the iOS 10 beta, follow this guide.

Like many technology companies, Cupertino does not now run a bug bounty program that awards cash prize to security researchers that find security holes in the company's software. But rather than an oversight by Apple, experts told MIT Technology Review it could be a novel strategy from Apple to encourage researchers to report flaws.

Still, security experts note that since the company's showdown with the Federal Bureau of Investigation over encryption, Apple's devices have been closely scrutinized and the company's security measures have become a central focus for many in the security field. This move could potentially be used by "jailbreakers" - people who release code that removes an operating system's restrictions to allow a wider range of software to be used. It might now be a good idea to launch one. This came as surprising news, especially considering Apple's vocal stance on user privacy and security. According to Fortune, Apple might have anxious some users when it was revealed the company unencrypted the kernel in iOS 10.

Apple recently showed off a preview version of iOS 10 at a developer’s conference and as developers are wont to do they immediately hacked into the code to see what they could find inside. However, the company has now responded saying that this was in fact a strategic move, and was done to optimize the OS performance.

The kernel controls how apps access hardware resources and manages security. The tech giant probably released the unencrypted beta version to expand its debugging strategy. And, the security experts were quite surprised when they found that the smartphone maker had not obscured the workings of the center of its OS by using encryption as it did before. AlmonteAlDia.com 

Read 1402 times
Login to post comments