I've been an #iOS Lockdown Mode user (and iCloud Advanced Data Security) for ~3 years now, it breaks a few things but... might be worth it to be Cellebrite and zero-day proof these days?

https://techcrunch.com/2026/03/27/apple-says-no-one-using-lockdown-mode-has-been-hacked-with-spyware/

#security #iphone

Apple says no one using Lockdown Mode has been hacked with spyware | TechCrunch

The tech giant's claim that it has not seen any successful spyware attacks targeting Apple devices with Lockdown Mode enabled comes amid a leak of hacking tools targeting users running devices with older software.

TechCrunch

My write-up on the feature after a year of using Lockdown Mode:

https://sethmlarson.dev/ios-lockdown-mode

Lockdown Mode for Apple devices

Back in September 2023 the libwebp vulnerability (also known as BLASTPASS) was being actively exploited to target a journalist's mobile device. After reading the report from Citizen Lab I learned a...

sethmlarson.dev

@sethmlarson

> If you have a decent reason to expect you'd be the target of a cyberattack, then you should definitely consider it.

There's something in the back of my head that makes me wonder if I'm ignorant of a reason that would make me a target. I imagine you're talking about state actors and people who work for the intelligence agencies and with classified information.

But what about people with PyPI access to massively installed packages?

@CodenameTim I'm not sure I agree with Apple's language in their documentation. They imply a world where these tools or zero-days are only used in niche or highly targeted situations. I'm not sure how true that is right now.