Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.
Endigest AI Core Summary
Apple confirms that no device with Lockdown Mode enabled has been successfully compromised by mercenary spyware in the nearly four years since the feature launched.
•Lockdown Mode, introduced in 2022, disables commonly exploited features on iPhones and Apple devices to defend against government-grade spyware from groups like NSO Group, Intellexa, and Paragon Solutions.
•Amnesty International's security lab corroborates Apple's claim, stating they have seen no evidence of a successful compromise on a Lockdown Mode-enabled device.
•Citizen Lab researchers documented at least two cases where Lockdown Mode actively blocked spyware attacks, including NSO's Pegasus and Predator spyware.
•Google security researchers found that spyware would abort infection attempts upon detecting Lockdown Mode, likely to avoid detection.
•Security expert Patrick Wardle notes the feature eliminates entire exploit delivery mechanisms, including most message attachment types and restricted WebKit features,
This summary was automatically generated by AI based on the original article and may not be fully accurate.