> The Neo doesn’t have a hardware indicator light for the camera. The indication for “camera in use” is only in the menu bar. There’s a privacy/security implication for this omission. According to Apple, the hardware indicator light for camera-in-use on MacBooks, iPhones, and iPads cannot be circumvented by software. If the camera is on, that light comes on, and no software can disable it. Because the Neo’s only camera-in-use indicator is in the menu bar, that seems obviously possible to circumvent via software.

iPhone and iPad does not have a hardware indicator light

There is a ton of fascinating work to make the "software" camera in use indicator just as secure if not more secure than an LED attached to the power lines of the camera. Apple hasn't publicly talked about it much but here are two sources that aren't terrible.

https://arxiv.org/abs/2510.09272
https://randomaugustine.medium.com/on-apple-exclaves-d683a2c...
https://daringfireball.net/linked/2025/03/19/on-apple-exclav...

We've seen a few examples on HN lately (Coruna iOS Exploit Kit) of nation state level exploits in the hands of financially motivated organizations. I'm not free of bias here but the industry is quickly headed towards a reckoning in terms of security over the next few years.

Modern iOS Security Features -- A Deep Dive into SPTM, TXM, and Exclaves

The XNU kernel is the basis of Apple's operating systems. Although labeled as a hybrid kernel, it is found to generally operate in a monolithic manner by defining a single privileged trust zone in which all system functionality resides. This has security implications, as a kernel compromise has immediate and significant effects on the entire system. Over the past few years, Apple has taken steps towards a more compartmentalized kernel architecture and a more microkernel-like design. To date, there has been no scientific discussion of SPTM and related security mechanisms. Therefore, the understanding of the system and the underlying security mechanisms is minimal. In this paper, we provide a comprehensive analysis of new security mechanisms and their interplay, and create the first conclusive writeup considering all current mitigations. SPTM acts as the sole authority regarding memory retyping. Our analysis reveals that, through SPTM domains based on frame retyping and memory mapping rule sets, SPTM introduces domains of trust into the system, effectively gapping different functionalities from one another. Gapped functionality includes the TXM, responsible for code signing and entitlement verification. We further demonstrate how this introduction lays the groundwork for the most recent security feature of Exclaves, and conduct an in-depth analysis of its communication mechanisms. We discover multifold ways of communication, most notably xnuproxy as a secure world request handler, and the Tightbeam IPC framework. The architecture changes are found to increase system security, with key and sensitive components being moved out of XNU's direct reach. This also provides additional security guarantees in the event of a kernel compromise, which is no longer an immediate threat at the highest trust level.

arXiv.org
I am well aware of that work and the result is not more secure than power lines turning the LED on.