Post by DorperPost by Wally JAccording to the gov, there is no smartphone OS more exploited than is iOS.
<https://www.cisa.gov/known-exploited-vulnerabilities-catalog>
CISA NVD is a mirror of The MITRE Corporation's CVE system, which is flawed.
And you don't understand how different operating systems are packaged.
It's good that you're thinking - which means there's a possibility of
learning but first we have to equilibrate our knowledge to a common ground.
You can't seriously claim, sans a single slice of evidence, that I don't
understand that iOS is packaged as a monolith (yes, a delta is applied to
each & every user but the release is built and tested as a monolith).
To be clear, you may not even be aware that only in iOS 16 did iOS _begin_
to break down that primitive monolith - which I'm not sure you're aware of.
*About Rapid Security Responses - only available in iOS 16 and up*
<https://support.apple.com/en-us/HT201224>
The RSR aside, the primitive release process only Apple employs is very
likely the fundamental reason why iOS has not only the most zero-day holes
(by far!) but also the most _exploited_ vulnerabilities (ten times more!).
Post by DorperPost by Wally JDue to the primitive update mechanism only Apple employs, zero-day bugs
last far longer in Apple operating system than in Android for example.
Windows employs the same update strategy.
https://www.catalog.update.microsoft.com/Search.aspx?q=windows+10
You can't seriously claim, sans a shred of evidence, that Windows is a
monolith like iOS is a monolith since Microsoft does NOT update
Windows as the primitive stone-age monolithic package that Apple uses.
How do most Windows users get their updated drivers, for example?
*You do know they don't generally come from Microsoft, right?*
Where do you think the iOS drivers come from?
Quite different from Apple's monolithic update mechanism, Android has
Project Treble with Qualcomm where the drivers are asynchronously
updated irrespective of the carrier and the Android release process.
<https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and>
Likewise, are you aware how major applications on Windows and Android
update? Again, nothing like that of the primitive monolithic method Apple
uses.
You can't be oblivious that with Apple - it's everything - or nothing.
With every other operating system - the updates are in many layers.
With iOS, you instantly lose full support the moment a next release ships!
*Distinguishing software updates from upgrades*
<https://support.apple.com/guide/deployment/about-software-updates-depc4c80847a/>
It's fine that Apple uses a stone-age primitive update mechanism - which is
Apple's prerogative - but it's the main reason iOS has the most zero day
holes and even more importantly the most exploited zero-day holes.
By far.
Post by DorperAnd the iOS security sandbox model makes it so a compromised app will not be
able to screw up the entire rest of your system, like it is so in Android.
WTF? You've never heard of the many zero-click zero-day exploits of iOS?
Are you serious?
Again, we have to get to common ground which is you can't discount that
on average, iOS has had one a month (sometimes two or three!) for years!
*You can't just ignore that iOS has been extremely insecure* (for years!)
Look it up before you respond please as the major problem outlined here is
that the primitive stone-age update mechanism that only Apple employs is
the main reason iOS not only has the most zero day holes (by far), very
many of which are also zero-click vulnerabilities... but this primitive
update mechanism is also why iOS has very many times the zero-click
_exploits_ that are already abused by malevolent actors in the wild.
--
My role is the truth about Apple products and to expose the iKooks too.