{"id":50263,"date":"2016-02-29T09:30:43","date_gmt":"2016-02-29T17:30:43","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=50263"},"modified":"2020-07-16T17:27:15","modified_gmt":"2020-07-17T00:27:15","slug":"the-evolution-of-ios-security-and-privacy-features","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/","title":{"rendered":"The Evolution of iOS Security and Privacy Features"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51163\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-Features-Evolution-Timeline.jpg\" alt=\"Evolution of iOS Security and Privacy Features\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-Features-Evolution-Timeline.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-Features-Evolution-Timeline-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-Features-Evolution-Timeline-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>We recently published a story covering <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-security-features-timeline\/\" target=\"_blank\" rel=\"noopener noreferrer\">the evolution of macOS security and privacy features<\/a>,\u00a0where we discussed the\u00a0major security improvements over the past decade in OS X, Apple&#8217;s operating system for Mac desktops and laptops.<\/p>\n<p>As with desktop operating systems, the ever-changing threat landscape has also necessitated the evolution of mobile operating systems, including iOS.<\/p>\n<p><img loading=\"lazy\" class=\"alignright wp-image-30394\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg\" alt=\"Android vs iOS app permissions\" width=\"200\" height=\"130\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260.jpeg 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260-150x97.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260-300x195.jpeg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/08\/permissions-400x260-305x200.jpeg 305w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Google&#8217;s Android isn&#8217;t the only mobile platform with security problems. In spite of the iPhone, iPad, and iPod touch being known for their locked-down nature and &#8220;walled garden&#8221; app ecosystem, iOS devices are not as perfectly safe as we might like to believe. Exploits that can take advantage of iOS are out there in the wild, and even Apple&#8217;s ostensibly &#8220;safe&#8221; App Store has been penetrated with questionable and malicious software on several occasions (<a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-cleans-house-pulls-xcodeghost-malware-riddled-apps-from-app-store\/\" target=\"_blank\" rel=\"noopener noreferrer\">the XcodeGhost debacle<\/a> is just one example).<\/p>\n<p>Users of Apple&#8217;s smartphone and tablet have also been targets of fraud, identity theft, and espionage campaigns \u2014 just like users of desktops and laptops.<\/p>\n<p>To help protect its customers and combat some of these threats, Apple has added many security and privacy-enhancing features to iOS since its initial release nearly nine years ago. With each major revision, along with incremental security updates, Apple has continued to improve the baseline security of its mobile operating system.<\/p>\n<p>Following is a timeline of some notable security improvements that Apple has made in every version of iOS to date.<\/p>\n<h3>June 2007: iPhone OS 1<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51136\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-1.jpg\" alt=\"iPhone OS 1\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-1.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-1-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-1-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The iPhone was the first of what we now know as &#8220;iOS devices.&#8221; However, when the iPhone was announced, Apple had yet to come up with a name for its new mobile operating system; in fact, you might be surprised to learn that <a href=\"http:\/\/web.archive.org\/web\/20070112064939\/http:\/\/www.apple.com\/iphone\/technology\/osx.html\" target=\"_blank\" rel=\"noopener noreferrer\">Apple actually called iOS &#8220;OS X&#8221;<\/a> at first.<\/p>\n<p>Apple had little to say about the security of the first iPhone. For its time, the original iPhone was far more advanced than any other smartphone on the market, so few people bothered worrying about things like security. After all, it was amazing and revolutionary, so what else really mattered?<\/p>\n<p>Little did anyone know then what security challenges lay in store for mobile operating systems.<img loading=\"lazy\" class=\"alignright size-medium wp-image-50869\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iPhone1-160x300.png\" alt=\"Original iPhone\" width=\"160\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iPhone1-160x300.png 160w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iPhone1-80x150.png 80w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iPhone1.png 264w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/><\/p>\n<p>Although there was no App Store yet, and thus there were no officially sanctioned third-party applications, the original iPhone included &#8220;a rich HTML email client and Safari \u2014 the most advanced web browser ever on a portable device,&#8221; which unbeknownst to most users made the phone vulnerable to a variety of potential attacks.<\/p>\n<p>By the time the iPhone was just months old and the iPod touch had just been released, there was already a small community of hackers and tinkerers making and distributing unauthorized third-party apps.<\/p>\n<p>Apple&#8217;s first attempt at squashing this phenomenon arrived in the form of the <a href=\"http:\/\/web.archive.org\/web\/20080323082324\/http:\/\/docs.info.apple.com\/article.html?artnum=306586\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone 1.1.1 Update<\/a>, about which <a href=\"http:\/\/www.macrumors.com\/2007\/09\/27\/iphone-1-1-1-harder-to-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">one developer noted<\/a>, &#8220;It looks like Apple is locking down the iPhone with encryption and signing, the same way they locked down the iPod Touch.&#8221;<\/p>\n<p>Prior to the iPhone 2.0 software release, there were a total of <a href=\"https:\/\/web.archive.org\/web\/20080323082324\/http:\/\/support.apple.com\/kb\/HT1222\" target=\"_blank\" rel=\"noopener noreferrer\">four security updates<\/a> for the original iPhone OS, fixing a combined total of 22 security vulnerabilities (note: vulnerability counts in this article are based on <a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CVE IDs<\/a>).<\/p>\n<h3>July 2008: iPhone OS 2<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51139\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-2.jpg\" alt=\"iPhone OS 2\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-2.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-2-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-2-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><a href=\"http:\/\/www.macworld.com\/article\/1134503\/iphone2update.html\" target=\"_blank\" rel=\"noopener noreferrer\">Macworld reported<\/a> that the iPhone 2.0 software (later renamed &#8220;iPhone OS&#8221; for its 2.2 release) included a single new built-in app: the App Store. For some, this lessened the desire to hack one&#8217;s own iPhone to install unapproved third-party software; nevertheless, the jailbreaking community continues to have its devotees even today.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-50878\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/cisco_vpn.jpg\" alt=\"Cisco VPN options\" width=\"111\" height=\"210\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/cisco_vpn.jpg 139w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/cisco_vpn-80x150.jpg 80w\" sizes=\"(max-width: 111px) 100vw, 111px\" \/>Apple added a number of security improvements to the iPhone 2.0 software, with a primary focus on making the iPhone a more viable option for enterprise businesses. Among the <a href=\"https:\/\/web.archive.org\/web\/20080721022552\/http:\/\/www.apple.com\/iphone\/enterprise\/\" target=\"_blank\" rel=\"noopener noreferrer\">new features<\/a> were support for Cisco IPSec VPNs, Wi-Fi support for WPA2 Enterprise and 802.1x authentication, configuration profiles for enforcing security policies, and the ability for a company to remotely wipe (erase) an employee&#8217;s lost or stolen iPhone. It was also possible to add <a href=\"http:\/\/www.macworld.com\/article\/1134503\/iphone2update.html\" target=\"_blank\" rel=\"noopener noreferrer\">multiple VPN configurations<\/a>, and Apple added a &#8220;VPN&#8221; icon to the top of the screen to make it more obvious to the user when they were connected.<\/p>\n<div id=\"attachment_50872\" style=\"width: 490px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-50872\" loading=\"lazy\" class=\"wp-image-50872 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/VPN_icon.png\" alt=\"VPN icon\" width=\"480\" height=\"38\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/VPN_icon.png 480w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/VPN_icon-150x12.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/VPN_icon-300x24.png 300w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><p id=\"caption-attachment-50872\" class=\"wp-caption-text\">The VPN indicator icon (a newer iOS version is pictured). Image credit: <a href=\"https:\/\/support.apple.com\/en-us\/HT201550\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a><\/p><\/div>\n<p>Apple also opened up Location Services to third-party applications, which would prompt the user for permission first.<\/p>\n<p>The iPhone 2.0 software itself fixed a total of <a href=\"https:\/\/web.archive.org\/web\/20090330050324\/http:\/\/support.apple.com\/kb\/HT2351\" target=\"_blank\" rel=\"noopener noreferrer\">13 security vulnerabilities<\/a>. It was followed by a total of <a href=\"https:\/\/web.archive.org\/web\/20090627150028\/http:\/\/support.apple.com\/kb\/HT1222\" target=\"_blank\" rel=\"noopener noreferrer\">two security updates<\/a> (prior to the iPhone OS 3.0 Software Update) fixing a combined total of 20 vulnerabilities.<\/p>\n<h3>June 2009: iPhone OS 3<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51142\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-3.jpg\" alt=\"iPhone OS 3\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-3.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-3-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-3-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>One of the biggest security improvements in iPhone OS 3 was that users who paid $100 per year for MobileMe (the predecessor of iCloud) could enable <a href=\"http:\/\/gizmodo.com\/5292789\/iphone-os-30-software-review-what-to-expect\" target=\"_blank\" rel=\"noopener noreferrer\">Find My iPhone<\/a>. This feature provided the ability to locate a lost or stolen iPhone, with options to subsequently send the device an alert sound or an &#8220;Important Message&#8221; dialog box, or even remotely deactivate or wipe the phone similar to the corporate remote-wipe feature added in the iPhone 2.0 software.<\/p>\n<p><img loading=\"lazy\" class=\" size-thumbnail wp-image-29125 alignright\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/find-iphone-170-150x150.jpeg\" alt=\"Find My iPhone\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/find-iphone-170-150x150.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/find-iphone-170.jpeg 170w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>However, the iPhone OS 3.0 implementation of Find My iPhone could be <a href=\"http:\/\/gizmodo.com\/5288618\/whoever-steals-your-iphone-can-just-turn-off-find-my-iphone-location-tracking\" target=\"_blank\" rel=\"noopener noreferrer\">fairly easy for a thief to bypass<\/a>, given the right circumstances. If an iPhone owner had turned off Location Services, then the Find My iPhone feature would not work in the first place. If an iPhone owner had left Location Services on but neglected to enable a passcode to lock their phone, then a thief could simply swipe to unlock the phone and disable either the Find My iPhone feature or Location Services immediately after stealing it. MobileMe-subscribing iPhone owners who did not have a passcode on their phone, and then lost their phone, could <a href=\"http:\/\/www.imore.com\/iphone-os-3-1-review\" target=\"_blank\" rel=\"noopener noreferrer\">remotely assign a passcode<\/a> to prevent whoever found the phone from unlocking it (this feature was introduced in iPhone OS 3.1).<\/p>\n<p>Apple added an <a href=\"http:\/\/gizmodo.com\/5292789\/iphone-os-30-software-review-what-to-expect\" target=\"_blank\" rel=\"noopener noreferrer\">AutoFill feature<\/a> to Safari in iPhone OS 3. The feature only automatically filled in contact information from the user&#8217;s Address Book; Apple opted to not AutoFill credit card information at that time (although the feature was added several years later in iOS 7).<\/p>\n<p>The iPhone OS 3.0 software itself fixed a total of <a href=\"https:\/\/web.archive.org\/web\/20090621122901\/http:\/\/support.apple.com\/kb\/HT3639\" target=\"_blank\" rel=\"noopener noreferrer\">46 security vulnerabilities<\/a>. It was followed by a total of three security updates (prior to the release of iOS 4) fixing a combined total of 16 vulnerabilities.<\/p>\n<h3>June 2010: iOS 4<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51145\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-4.jpg\" alt=\"iOS 4\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-4.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-4-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-4-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>In iOS 4, Apple introduced the <a href=\"http:\/\/www.macworld.com\/article\/1152167\/ios4_need_to_know.html\" target=\"_blank\" rel=\"noopener noreferrer\">option to use a long password<\/a> rather than a four-digit PIN to log into an iOS device. Now instead of a limit of 10,000 possible passwords (which made it possible to guess the correct password within hours if trying every combination one at a time), the password options could now be virtually limitless, which could dramatically increase the security of unlocking an iOS device.<\/p>\n<p>Apple added functionality to <a href=\"https:\/\/support.apple.com\/en-us\/HT202064\" target=\"_blank\" rel=\"noopener noreferrer\">encrypt e-mail attachments<\/a> when the device was locked with a passcode (for supported iOS devices). This encryption was extended to third-party applications, which could also now encrypt their data using the same technology.<\/p>\n<p>Apple also improved privacy in iOS 4 by giving users <a href=\"http:\/\/arstechnica.com\/apple\/2010\/06\/ars-reviews-ios-4-whats-new-and-notable\/7\/\" target=\"_blank\" rel=\"noopener noreferrer\">per-app control over Location Services<\/a>. Now it was possible to, for example, allow Maps access to your location while preventing your Twitter app from being able to identify where you were while composing a tweet. Whenever an app was currently tracking your location, an indicator icon would appear in the bar across the top of the screen to indicate this; a user could then find out which app was currently using their location by opening the Settings app and looking under Location Services.<\/p>\n<div id=\"attachment_51100\" style=\"width: 330px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-51100\" loading=\"lazy\" class=\"wp-image-51100 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ios_4_locations_services.png\" alt=\"iOS 4 Location Services\" width=\"320\" height=\"417\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ios_4_locations_services.png 320w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ios_4_locations_services-115x150.png 115w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ios_4_locations_services-230x300.png 230w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><p id=\"caption-attachment-51100\" class=\"wp-caption-text\">Image credit: <a href=\"https:\/\/support.apple.com\/en-us\/HT201674\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a><\/p><\/div>\n<p>The iOS 4.0 release itself fixed a total of <a href=\"https:\/\/web.archive.org\/web\/20100625145212\/http:\/\/support.apple.com\/kb\/HT4225\" target=\"_blank\" rel=\"noopener noreferrer\">65 security vulnerabilities<\/a>. It was followed by a total of <a href=\"https:\/\/web.archive.org\/web\/20111015034414\/http:\/\/support.apple.com\/kb\/HT1222\" target=\"_blank\" rel=\"noopener noreferrer\">seven main security updates<\/a> (prior to the release of iOS 5) that fixed 179 vulnerabilities. (Now Apple was really getting into the security-patching groove.)<\/p>\n<h3>October 2011: iOS 5<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51148\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-5.jpg\" alt=\"iOS 5\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-5.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-5-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-5-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Apple added an &#8220;Unsecured Call&#8221; warning dialog box to iOS 5, mysteriously without providing any documentation to explain this feature (a <a href=\"https:\/\/www.google.com\/search?q=site%3Aapple.com%20%22unsecured%20call%22\" target=\"_blank\" rel=\"noopener noreferrer\">Google search of Apple&#8217;s site<\/a> only reveals one discussion topic from a single concerned user, and searching Apple&#8217;s site via their own search bar produces no search results). The warning dialog box, titled &#8220;Unsecured Call,&#8221; states, &#8220;The cellular network you are using is not encrypted. This call can be intercepted by unauthorized listeners,&#8221; with buttons to either Ignore or End Call. A <a href=\"http:\/\/9to5mac.com\/2011\/06\/07\/ios-5-unsecured-calls-warning-lets-users-know-if-they-are-talking-on-unencrypted-networks\/\" target=\"_blank\" rel=\"noopener noreferrer\">9to5Mac article<\/a> points to speculation that Apple&#8217;s warning could be notifying the user of active attacks of the sort shown in a DEF CON 18 talk given in 2010, in which a researcher demonstrated how GSM networks (like AT&amp;T and T-Mobile) could easily have their calls intercepted and recorded; see the <a href=\"https:\/\/www.defcon.org\/html\/defcon-18\/dc-18-speakers.html#Paget\" target=\"_blank\" rel=\"noopener noreferrer\">DEF CON talk description<\/a> and <a href=\"https:\/\/www.youtube.com\/watch?v=fQSu9cBaojc\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube video<\/a>.<\/p>\n<div id=\"attachment_51112\" style=\"width: 343px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-51112\" loading=\"lazy\" class=\"wp-image-51112\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/unsecured-call.png\" alt=\"Image credit: @MuscleNerd\" width=\"333\" height=\"500\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/unsecured-call.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/unsecured-call-100x150.png 100w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/unsecured-call-200x300.png 200w\" sizes=\"(max-width: 333px) 100vw, 333px\" \/><p id=\"caption-attachment-51112\" class=\"wp-caption-text\">Image credit: <a href=\"https:\/\/twitter.com\/musclenerd\/status\/78246296544219136\" target=\"_blank\" rel=\"noopener noreferrer\">@MuscleNerd<\/a><\/p><\/div>\n<p><img loading=\"lazy\" class=\" wp-image-51127 alignright\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Friends-original-icon-150x150.jpg\" alt=\"Find My Friends' original skeuomorphic icon\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Friends-original-icon-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Friends-original-icon-300x300.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/Find-My-Friends-original-icon.jpg 512w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>Apple also designed a new app called Find My Friends that gave the option of sharing one&#8217;s location with other iOS users. Apple put a lot of thought into privacy when developing this app, and made it clear what data would be shared with whom. <a href=\"http:\/\/arstechnica.com\/apple\/2011\/10\/hands-on-with-find-my-friends-apples-google-latitude\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ars Technica has a detailed rundown<\/a> of how Find My Friends worked.<\/p>\n<p>The iOS 5.0 release itself fixed a total of <a href=\"https:\/\/web.archive.org\/web\/20120915071210\/http:\/\/support.apple.com\/kb\/HT4999\" target=\"_blank\" rel=\"noopener noreferrer\">96 security vulnerabilities<\/a>. It was followed by a total of <a href=\"https:\/\/web.archive.org\/web\/20121004201717\/http:\/\/support.apple.com\/kb\/HT1222\" target=\"_blank\" rel=\"noopener noreferrer\">three security updates<\/a> (prior to the release of iOS 6) that fixed 90 vulnerabilities.<\/p>\n<h3>September 2012: iOS 6<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51151\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-6.jpg\" alt=\"iOS 6\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-6.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-6-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-6-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Apple included some new privacy features in iOS 6. In the Settings app there was a Privacy section that now included the Location Services functionality mentioned above, and also included toggle switches to enable or disable apps&#8217; access to your contacts, calendars, reminders, photos, and your Twitter and Facebook accounts. This section also included a Bluetooth Sharing screen that showed decides that had requested to share data via Bluetooth.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-51115\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ios_6_privacy_settings-218x300.jpg\" alt=\"iOS 6 Privacy Settings\" width=\"218\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ios_6_privacy_settings-218x300.jpg 218w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ios_6_privacy_settings-109x150.jpg 109w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/ios_6_privacy_settings.jpg 300w\" sizes=\"(max-width: 218px) 100vw, 218px\" \/>Also in the Settings app, but found under General &gt; About &gt; Advertising &gt; Limit Ad Tracking, was a toggle switch allowing users to turn &#8220;Limit Ad Tracking&#8221; to ON (later, in iOS 7, this setting was moved to the Privacy section with the other features noted above). The <a href=\"https:\/\/support.apple.com\/en-us\/HT202074\" target=\"_blank\" rel=\"noopener noreferrer\">Limit Ad Tracking<\/a> feature was designed to prevent apps from displaying ads targeted toward a user&#8217;s interests.<\/p>\n<p>A guide to these privacy options with additional screenshots can be <a href=\"http:\/\/www.iphonehacks.com\/2012\/10\/ios-6-manage-privacy-settings-iphone-ipad-ipod-touch.html\" target=\"_blank\" rel=\"noopener noreferrer\">found at iPhoneHacks<\/a>.<\/p>\n<p>The iOS 6.0 release itself fixed a total of <a href=\"https:\/\/web.archive.org\/web\/20131023063242\/http:\/\/support.apple.com\/kb\/HT5503\" target=\"_blank\" rel=\"noopener noreferrer\">197 security vulnerabilities<\/a>. It was followed by a total of <a href=\"https:\/\/web.archive.org\/web\/20130921111620\/http:\/\/support.apple.com\/kb\/HT1222\" target=\"_blank\" rel=\"noopener noreferrer\">three security updates<\/a> (prior to the release of iOS 7) that fixed 37 vulnerabilities.<\/p>\n<h3>September 2013: iOS 7<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51154\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-7.jpg\" alt=\"iOS 7\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-7.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-7-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-7-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Apple did much to improve security in iOS 7, but this major iOS release was not without controversy.<\/p>\n<p>Let&#8217;s get the most controversial items out of the way first.<\/p>\n<p>The infamous <a href=\"http:\/\/www.wired.com\/2014\/02\/gotofail\/\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;goto fail&#8221; SSL bug<\/a> that came to light in February 2014 rattled the security community, prompting wild speculation that Apple may have intentionally bypassed the SSL digital signature check to give the U.S. government a backdoor. The bug <a href=\"https:\/\/www.imperialviolet.org\/2014\/02\/22\/applebug.html\" target=\"_blank\" rel=\"noopener noreferrer\">had been present<\/a> in all iOS 7 versions prior to 7.0.6, some versions of iOS 6 prior to 6.1.6, and versions of OS X Mavericks prior to 10.9.2. Part of the public outcry over the &#8220;goto fail&#8221; bug was due to OS X not being patched in tandem with iOS; users had to wait a while until Mavericks version 10.9.2 was released to fix the problem on the Mac side.<\/p>\n<div id=\"attachment_51103\" style=\"width: 601px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-51103\" loading=\"lazy\" class=\"size-full wp-image-51103\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/gotofail.png\" alt=\"The second &quot;goto fail;&quot; in this code caused a major security weakness in Apple's operating systems.\" width=\"591\" height=\"81\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/gotofail.png 591w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/gotofail-150x21.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/gotofail-300x41.png 300w\" sizes=\"(max-width: 591px) 100vw, 591px\" \/><p id=\"caption-attachment-51103\" class=\"wp-caption-text\">The second &#8220;goto fail;&#8221; in this code caused a major security weakness in Apple&#8217;s operating systems.<\/p><\/div>\n<p>Just a couple months later, there was further controversy when a researcher discovered that <a href=\"http:\/\/www.andreas-kurtz.de\/2014\/04\/what-apple-missed-to-fix-in-ios-711.html\" target=\"_blank\" rel=\"noopener noreferrer\">e-mail attachments were not actually being encrypted<\/a> when a passcode was enabled, in spite of Apple&#8217;s claims to the contrary. Apple <a href=\"http:\/\/www.imore.com\/apple-aware-ios-7-mail-attachment-bug-working-fix\" target=\"_blank\" rel=\"noopener noreferrer\">acknowledged the bug<\/a> and subsequently <a href=\"http:\/\/www.macworld.com\/article\/2449320\/ios-7-1-2-arrives-with-fixes-for-ibeacons-mail-attachment-encryption-more.html\" target=\"_blank\" rel=\"noopener noreferrer\">fixed it in iOS 7.1.2 <\/a>\u2014 which was released in June 2014, nine months after the initial release of iOS 7.<\/p>\n<p><img loading=\"lazy\" class=\"alignright wp-image-32437\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Activate-iPhone.jpeg\" alt=\"Activation Lock\" width=\"300\" height=\"195\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Activate-iPhone.jpeg 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Activate-iPhone-150x97.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Activate-iPhone-300x195.jpeg 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>A new feature called <a href=\"https:\/\/support.apple.com\/en-us\/HT201365\" target=\"_blank\" rel=\"noopener noreferrer\">Activation Lock<\/a>, which is on by default when Find My iPhone is enabled in iOS 7, was designed to deter would-be thieves from stealing iPhones. With the feature enabled, the owner&#8217;s Apple ID and password must be entered before anyone can disable Find My iPhone, erase the device, or reactivate and use the device \u2014 effectively turning stolen iOS devices into shiny doorstops. Naturally the idea that one&#8217;s device could be &#8220;bricked&#8221; by forgetting one&#8217;s password (or that a user could lock a company-owned device with their personal Apple ID) <a href=\"http:\/\/www.imore.com\/ios-7-security-good-bad-and-controversy\" target=\"_blank\" rel=\"noopener noreferrer\">prompted some concern<\/a>, but overall the feature was a step in the right direction for mobile device security. Intego has previously published <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/activation-lock\/\" target=\"_blank\" rel=\"noopener noreferrer\">several articles about Activation Lock<\/a>.<\/p>\n<p><a href=\"https:\/\/support.apple.com\/en-us\/HT201371\" target=\"_blank\" rel=\"noopener noreferrer\">Touch ID<\/a> was a new feature introduced in iOS 7 to complement the new Home button fingerprint sensor on the iPhone 5s (and later iPad and iPhone models). The Chaos Computer Club successfully <a href=\"https:\/\/www.intego.com\/mac-security-blog\/good-news-apples-touchid-sensor-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer\">fooled Touch ID with a fake fingerprint<\/a> just one day after the iPhone 5s was released. The feature also prompted concerns about <a href=\"http:\/\/www.wired.com\/2013\/09\/the-unexpected-result-of-fingerprint-authentication-that-you-cant-take-the-fifth\/\" target=\"_blank\" rel=\"noopener noreferrer\">whether one can &#8220;take the fifth,&#8221;<\/a> or in other words refuse to unlock a device when compelled to do so by law enforcement, when the unlocking method is &#8220;something you are&#8221; as opposed to &#8220;something you know.&#8221;<\/p>\n<p>Heck, someone with a <a href=\"https:\/\/twitter.com\/LysaMyers\/status\/379672982651932672\" target=\"_blank\" rel=\"noopener noreferrer\">simple wrench<\/a> could just knock you out and use your finger to unlock your iPhone before stealing it or rummaging through its contents. Touch ID certainly had its <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-fingerprint-scanner-for-iphone-the-good-and-the-bad\/\" target=\"_blank\" rel=\"noopener noreferrer\">positive and negative<\/a> points. To date, Apple still has not given users the option to require <em>both<\/em> unlocking methods, a fingerprint and a password, which would provide effective two-factor authentication.<\/p>\n<div id=\"attachment_51106\" style=\"width: 414px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-51106\" loading=\"lazy\" class=\"wp-image-51106\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/girl-unlocks-dads-iphone.jpg\" alt=\"Let's just say Touch ID has its flaws. Image credit: Imgur.\" width=\"404\" height=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/girl-unlocks-dads-iphone.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/girl-unlocks-dads-iphone-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/girl-unlocks-dads-iphone-300x297.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/girl-unlocks-dads-iphone-657x651.jpg 657w\" sizes=\"(max-width: 404px) 100vw, 404px\" \/><p id=\"caption-attachment-51106\" class=\"wp-caption-text\">Let&#8217;s just say that Touch ID has some drawbacks. Image credit: <a href=\"https:\/\/imgur.com\/gallery\/iYENVxU\" target=\"_blank\" rel=\"noopener noreferrer\">Imgur<\/a>.<\/p><\/div>\n<p>Apple&#8217;s default <a href=\"https:\/\/support.apple.com\/en-us\/HT204023\" target=\"_blank\" rel=\"noopener noreferrer\">Personal Hotspot<\/a> passwords from previous versions of iOS could easily be brute-forced in &#8220;less than 50 seconds&#8221; according to <a href=\"https:\/\/www1.cs.fau.de\/hotspot\" target=\"_blank\" rel=\"noopener noreferrer\">research published in June 2013<\/a>, making it relatively easy to hijack someone else&#8217;s cellular data connection. <a href=\"http:\/\/www.imore.com\/ios-7-security-good-bad-and-controversy\" target=\"_blank\" rel=\"noopener noreferrer\">Apple mitigated this flaw<\/a> by improving the Personal Hotspot password generator in iOS 7.<\/p>\n<p>Many mobile devices had been vulnerable to an attack known as &#8220;<a href=\"http:\/\/krebsonsecurity.com\/2011\/08\/beware-of-juice-jacking\/\" target=\"_blank\" rel=\"noopener noreferrer\">juicejacking<\/a>,&#8221; where an untrusted public charging station could potentially steal data or inject malware into your device \u2014 without any interaction on the user&#8217;s part other than simply plugging in the charging cable. In a Black Hat conference talk in 2013, researchers demonstrated that <a href=\"http:\/\/www.imore.com\/malware-injecting-ios-charger-be-presented-black-hat\" target=\"_blank\" rel=\"noopener noreferrer\">they could infect an iOS device within one minute<\/a> after it was plugged in. In iOS 7, <a href=\"http:\/\/www.imore.com\/ios-7-security-good-bad-and-controversy\" target=\"_blank\" rel=\"noopener noreferrer\">Apple mitigated such attacks<\/a> by prompting users to decide whether to &#8220;<a href=\"https:\/\/support.apple.com\/en-us\/HT202778\" target=\"_blank\" rel=\"noopener noreferrer\">trust this computer<\/a>&#8221; when connecting an iOS device to anything that&#8217;s capable of more than just charging.<\/p>\n<div id=\"attachment_51109\" style=\"width: 360px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-51109\" loading=\"lazy\" class=\"wp-image-51109\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iphone6-ios9-trust-this-computer-e1456516996699.jpg\" alt=\"\" width=\"350\" height=\"240\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iphone6-ios9-trust-this-computer-e1456516996699.jpg 640w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iphone6-ios9-trust-this-computer-e1456516996699-150x103.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iphone6-ios9-trust-this-computer-e1456516996699-300x205.jpg 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/><p id=\"caption-attachment-51109\" class=\"wp-caption-text\">The &#8220;Trust This Computer?&#8221; prompt (iOS 9 pictured). Image credit: <a href=\"https:\/\/support.apple.com\/en-us\/HT202778\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a><\/p><\/div>\n<p>Several other iOS 7 security features and concerns are detailed in <a href=\"http:\/\/www.imore.com\/ios-7-security-good-bad-and-controversy\" target=\"_blank\" rel=\"noopener noreferrer\">this iMore article<\/a>.<\/p>\n<p>Apple released a <a href=\"https:\/\/web.archive.org\/web\/20140912131439\/http:\/\/images.apple.com\/iphone\/business\/docs\/iOS_Security_Feb14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">white paper<\/a> (PDF) in February 2014 detailing many very technical aspects of iOS 7&#8217;s core security functionality. Security expert Steve Gibson spent <a href=\"https:\/\/www.grc.com\/securitynow.htm#448\" target=\"_blank\" rel=\"noopener noreferrer\">three consecutive episodes<\/a> of the Security Now! podcast delving into the details covered by this white paper.<\/p>\n<p>The iOS 7.0 release itself fixed a total of <a href=\"https:\/\/web.archive.org\/web\/20130922063539\/http:\/\/support.apple.com\/kb\/HT5934\" target=\"_blank\" rel=\"noopener noreferrer\">80 security vulnerabilities<\/a>. It was followed by a total of <a href=\"https:\/\/web.archive.org\/web\/20140923102913\/http:\/\/support.apple.com\/kb\/HT1222\" target=\"_blank\" rel=\"noopener noreferrer\">seven security updates<\/a> (prior to the release of iOS 8) that fixed 111 vulnerabilities.<\/p>\n<h3>September 2014: iOS 8<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51157\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-8.jpg\" alt=\"iOS 8\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-8.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-8-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-8-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>One of the most innovative new security and privacy features of iOS 8 is that when it uses Wi-Fi to scan for things nearby, for example to more accurately determine your phone&#8217;s location, iOS now uses a <a href=\"http:\/\/arstechnica.com\/apple\/2014\/06\/ios8-to-stymie-trackers-and-marketers-with-mac-address-randomization\/\" target=\"_blank\" rel=\"noopener noreferrer\">random spoofed MAC address<\/a> rather than the true physical MAC address of your phone&#8217;s wireless hardware. This feature was added, in part, because some retail stores had begun using mobile device MAC addresses to track where customers walked, how much time they spent in each section, and how often they frequented the store \u2014 all without explicitly asking the customer for permission to track them, and without giving them any way to opt out other than putting their phone in airplane mode.<\/p>\n<div id=\"attachment_51118\" style=\"width: 292px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-51118\" loading=\"lazy\" class=\"wp-image-51118\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/touch-id-third-party-577x1024.png\" alt=\"Third-party apps such as 1Password (pictured) can use Touch ID. Image credit: Andrew Cunningham, Ars Technica\" width=\"282\" height=\"501\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/touch-id-third-party-577x1024.png 577w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/touch-id-third-party-85x150.png 85w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/touch-id-third-party-169x300.png 169w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/touch-id-third-party.png 640w\" sizes=\"(max-width: 282px) 100vw, 282px\" \/><p id=\"caption-attachment-51118\" class=\"wp-caption-text\">Beginning in iOS 8, third-party apps such as 1Password (pictured) can use Touch ID. Image credit: Andrew Cunningham of <a href=\"http:\/\/arstechnica.com\/apple\/2014\/09\/ios-8-thoroughly-reviewed\/10\/#h3\" target=\"_blank\" rel=\"noopener noreferrer\">Ars Technica<\/a><\/p><\/div>\n<p>Apple opened up Touch ID authentication to third-party developers in iOS 8. This means that any app that adds the feature can prompt you to place your finger on the Home button to unlock the app, or certain parts of the app.<\/p>\n<p><img loading=\"lazy\" class=\" wp-image-51124 size-thumbnail alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/DDG-icon_256x256-150x150.png\" alt=\"DuckDuckGo logo\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/DDG-icon_256x256-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/DDG-icon_256x256.png 256w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>In iOS 8, Apple added DuckDuckGo as an optional search provider to Safari (although Google continued to be the Web browser&#8217;s default search engine). <a href=\"https:\/\/duckduckgo.com\" target=\"_blank\" rel=\"noopener noreferrer\">DuckDuckGo<\/a> prides itself on being &#8220;the search engine that doesn&#8217;t track you,&#8221; making a point of not collecting any personal information from users. Check out <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-interviews-gabriel-weinberg-founder-ceo-duckduckgo\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intego&#8217;s interview of DuckDuckGo founder and CEO Gabriel Weinberg<\/a>.<\/p>\n<p><img loading=\"lazy\" class=\" wp-image-51121 alignright\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/HealthKit_HomeKit-300x144.png\" alt=\"HealthKit and HomeKit\" width=\"250\" height=\"120\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/HealthKit_HomeKit-300x144.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/HealthKit_HomeKit-150x72.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/HealthKit_HomeKit.png 640w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/>Along with the introduction of <a href=\"https:\/\/www.apple.com\/ios\/health\/\" target=\"_blank\" rel=\"noopener noreferrer\">HealthKit<\/a>, Apple added new options in the Settings app&#8217;s Privacy section for Health and Motion &amp; Fitness. Similarly, when <a href=\"https:\/\/support.apple.com\/en-us\/HT204893\" target=\"_blank\" rel=\"noopener noreferrer\">HomeKit<\/a> was added in iOS 8.1, a corresponding Privacy option was available for it as well.<\/p>\n<p>Several other new security and privacy enhancements in iOS 8 can be found in a <a href=\"https:\/\/lmjabreu.com\/post\/ios-8-privacy-updates\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog post by Louie Abreu<\/a> (hat tip to <a href=\"http:\/\/arstechnica.com\/apple\/2014\/09\/ios-8-thoroughly-reviewed\/10\/#h2\" target=\"_blank\" rel=\"noopener noreferrer\">Ars Technica<\/a>).<\/p>\n<p>The iOS 8.0 release itself fixed a total of <a href=\"https:\/\/web.archive.org\/web\/20140922073939\/http:\/\/support.apple.com\/kb\/HT6441\" target=\"_blank\" rel=\"noopener noreferrer\">56 security vulnerabilities<\/a>. It was followed by a total of eight security updates (prior to the release of iOS 9) that fixed 219 vulnerabilities.<\/p>\n<h3>September 2015: iOS 9<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51160\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-9.jpg\" alt=\"iOS 9\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-9.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-9-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-9-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The most controversial feature of iOS 9 was the introduction of Content Blockers, a new category of software downloadable from the App Store. Content Blockers can be used to either hide Web page components from view, or block them outright so they won&#8217;t be loaded in the first place. <a href=\"https:\/\/support.apple.com\/en-us\/HT201265\" target=\"_blank\" rel=\"noopener noreferrer\">Apple states<\/a> that the types of content that can be blocked include &#8220;cookies, images, resources, pop-ups, and other content.&#8221; <img loading=\"lazy\" class=\"alignright wp-image-47170\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/AdBlockers-Howto.jpg\" alt=\"Content Blockers\" width=\"222\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/AdBlockers-Howto.jpg 325w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/AdBlockers-Howto-150x102.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/AdBlockers-Howto-300x203.jpg 300w\" sizes=\"(max-width: 222px) 100vw, 222px\" \/>Of course, ad blocking is one of the most common uses for content blockers, which brings ethical considerations into play about businesses&#8217; need to monetize their content via advertisements versus users&#8217; right to privacy and security; third-party advertisement systems have unintentionally hosted dangerous content several times in recent years. See also <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ad-blockers-ios-9\/\" target=\"_blank\" rel=\"noopener noreferrer\">Intego&#8217;s write-up about Content Blockers<\/a> as well as <a href=\"http:\/\/arstechnica.com\/apple\/2015\/09\/ios-9-thoroughly-reviewed\/6\/#h1\" target=\"_blank\" rel=\"noopener noreferrer\">Ars Technica&#8217;s overview<\/a> which delves further into the ethical and technical debate.<\/p>\n<p>Apple made <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-9-boost-passcode-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">six-digit passcodes<\/a> the default instead of the traditional four-digit passcodes. This effectively increased the number of possible PIN combinations from 10,000 to one million. Of course, a longer and more complex custom password (via Apple&#8217;s &#8220;Custom Alphanumeric Code&#8221; option) is still a much better option than numerals only. See Intego&#8217;s walkthrough on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-9-security-and-privacy-features-explained\/\" target=\"_blank\" rel=\"noopener noreferrer\">how to switch to a stronger iOS passcode<\/a>.<\/p>\n<div id=\"attachment_46075\" style=\"width: 292px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-46075\" loading=\"lazy\" class=\"wp-image-46075\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/passcode2-578x1024.jpg\" alt=\"Passcode options in iOS 9\" width=\"282\" height=\"500\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/passcode2-578x1024.jpg 578w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/passcode2-85x150.jpg 85w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/passcode2-169x300.jpg 169w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/passcode2.jpg 642w\" sizes=\"(max-width: 282px) 100vw, 282px\" \/><p id=\"caption-attachment-46075\" class=\"wp-caption-text\">Passcode options in iOS 9<\/p><\/div>\n<p>As noted in our companion article about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-security-features-timeline\/\" target=\"_blank\" rel=\"noopener noreferrer\">macOS security and privacy features<\/a>, Apple introduced App Transport Security (ATS), which encourages developers to use HTTPS and more specifically TLS 1.2 with forward secrecy (the latest successor to SSL), when their apps initiate Web requests to back-end servers (for example, to send or receive user data from the &#8220;cloud&#8221;). Apps created for iOS 9 and OS X 10.11 El Capitan have this feature enabled by default, but for now Apple allows developers to easily opt out and continue making connections using weaker encryption (e.g. SSL) or without encryption (HTTP).<\/p>\n<p>If you have both iOS 9 and OS X El Capitan, Apple encourages you to <a href=\"https:\/\/support.apple.com\/en-us\/HT204915\" target=\"_blank\" rel=\"noopener noreferrer\">enable two-factor authentication for your Apple ID<\/a>. You may be asking yourself, &#8220;Hasn&#8217;t that feature been around for a while?&#8221; The answer is no, not exactly. Apple has another feature that it calls <a href=\"https:\/\/support.apple.com\/en-us\/HT204152\" target=\"_blank\" rel=\"noopener noreferrer\">two-step verification<\/a>, but Apple&#8217;s two-factor authentication takes advantage of functionality built into the latest versions of iOS and OS X. You can read all the details about the new functionality in Apple&#8217;s support article: <a href=\"https:\/\/support.apple.com\/en-us\/HT204915\" target=\"_blank\" rel=\"noopener noreferrer\">Two-factor authentication for Apple ID<\/a>.<\/p>\n<p>You can read more about iOS 9 privacy and security features in <a href=\"https:\/\/support.apple.com\/en-us\/HT203033\" target=\"_blank\" rel=\"noopener noreferrer\">this Apple support article about iOS 9 privacy<\/a> as well as <a href=\"https:\/\/www.apple.com\/business\/docs\/iOS_Security_Guide.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">the latest version of Apple&#8217;s iOS Security white paper<\/a> (PDF).<\/p>\n<p>The iOS 9.0 release itself fixed a total of <a href=\"https:\/\/support.apple.com\/en-us\/HT205212\" target=\"_blank\" rel=\"noopener noreferrer\">105 security vulnerabilities<\/a>.<\/p>\n<h3>What&#8217;s Next?<\/h3>\n<p>Apple has already publicly announced a security feature that will be included in iOS 9.3. The upcoming iOS 9 update will give users the ability to lock individual notes in the Notes app using Touch ID or a password.<\/p>\n<div id=\"attachment_51130\" style=\"width: 341px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-51130\" loading=\"lazy\" class=\"wp-image-51130\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/notes_large.jpg\" alt=\"The upcoming iOS 9.3 will include the ability to protect the Notes app with Touch ID or a passcode. Image credit: Apple\" width=\"331\" height=\"500\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/notes_large.jpg 472w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/notes_large-99x150.jpg 99w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/notes_large-199x300.jpg 199w\" sizes=\"(max-width: 331px) 100vw, 331px\" \/><p id=\"caption-attachment-51130\" class=\"wp-caption-text\">iOS 9.3 will allow Touch ID locking for Notes. Image credit: <a href=\"https:\/\/www.apple.com\/ios\/preview\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a><\/p><\/div>\n<p>Each new version of iOS has included additional features, enhancements, and modifications that have improved the baseline security and privacy of the mobile operating system. It is commendable that Apple continues to include new and innovative improvements with each release. Of course, as is expected of major software companies, Apple also releases <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener noreferrer\">security updates<\/a> to remediate vulnerabilities discovered in the current version of the OS.<\/p>\n<p>Even with all that Apple has done and continues to do to keep iOS users safe, it&#8217;s critical for users to stay aware of the various types of attacks they may face on a daily basis, and to continually keep up on how to avoid falling victim to them. We encourage you to subscribe to The Mac Security Blog via the e-mail sign-up form in the sidebar, and to follow us on <a href=\"https:\/\/www.facebook.com\/Intego\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/twitter.com\/intent\/follow?original_referer=https%3A%2F%2Fwww.intego.com%2Fmac-security-blog%2Fmac-os-x-security-features-timeline%2F&amp;ref_src=twsrc%5Etfw&amp;region=follow_link&amp;screen_name=IntegoSecurity&amp;tw_p=followlink\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, to stay abreast of iOS and Mac security threats.<\/p>\n<p><em>What security and privacy features has Apple added to macOS over the past decade? Check out our companion article, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-security-features-timeline\/\">The Evolution of macOS Security and Privacy Features<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has added many security and privacy-enhancing features to iOS since its initial release. This timeline reveals the evolution of iPhone security. <\/p>\n","protected":false},"author":14,"featured_media":51172,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,151,13],"tags":[2794,69,9,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has added many security and privacy-enhancing features to iOS since its initial release. This timeline reveals the evolution of iPhone security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Evolution of iOS Security and Privacy Features - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has added many security and privacy-enhancing features to iOS since its initial release. This timeline reveals the evolution of iPhone security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-29T17:30:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-17T00:27:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg\",\"width\":400,\"height\":260,\"caption\":\"iOS Security and Privacy Timeline\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/\",\"name\":\"The Evolution of iOS Security and Privacy Features - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#primaryimage\"},\"datePublished\":\"2016-02-29T17:30:43+00:00\",\"dateModified\":\"2020-07-17T00:27:15+00:00\",\"description\":\"Apple has added many security and privacy-enhancing features to iOS since its initial release. This timeline reveals the evolution of iPhone security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Evolution of iOS Security and Privacy Features\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"The Evolution of iOS Security and Privacy Features\",\"datePublished\":\"2016-02-29T17:30:43+00:00\",\"dateModified\":\"2020-07-17T00:27:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#webpage\"},\"wordCount\":3442,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg\",\"keywords\":[\"Evolution\",\"iOS\",\"iPhone\",\"Security\"],\"articleSection\":[\"Apple\",\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has added many security and privacy-enhancing features to iOS since its initial release. This timeline reveals the evolution of iPhone security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/","og_locale":"en_US","og_type":"article","og_title":"The Evolution of iOS Security and Privacy Features - The Mac Security Blog","og_description":"Apple has added many security and privacy-enhancing features to iOS since its initial release. This timeline reveals the evolution of iPhone security.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2016-02-29T17:30:43+00:00","article_modified_time":"2020-07-17T00:27:15+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg","width":400,"height":260,"caption":"iOS Security and Privacy Timeline"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/","name":"The Evolution of iOS Security and Privacy Features - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#primaryimage"},"datePublished":"2016-02-29T17:30:43+00:00","dateModified":"2020-07-17T00:27:15+00:00","description":"Apple has added many security and privacy-enhancing features to iOS since its initial release. This timeline reveals the evolution of iPhone security.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Evolution of iOS Security and Privacy Features"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"The Evolution of iOS Security and Privacy Features","datePublished":"2016-02-29T17:30:43+00:00","dateModified":"2020-07-17T00:27:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#webpage"},"wordCount":3442,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg","keywords":["Evolution","iOS","iPhone","Security"],"articleSection":["Apple","Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-evolution-of-ios-security-and-privacy-features\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/iOS-Security-History-400x260.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-d4H","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50263"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=50263"}],"version-history":[{"count":29,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50263\/revisions"}],"predecessor-version":[{"id":91881,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/50263\/revisions\/91881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/51172"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=50263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=50263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=50263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}