Source: https://www.linkedin.com/feed/update/urn%3Ali%3Ashare%3A6861621795766755328
How Security Systems Protect Hackers Once Penetrated: “#Security #tools are completely blind, and #adversaries know this”:
“You’re going to keep out a lot of the riffraff by making it harder to break iPhones. But the 1% of #top #hackers are going to find a way in and, once they’re inside, the #impenetrable #fortress of the iPhone protects them.”
Virtually every expert agrees that the locked-down nature of #iOS has solved some fundamental #security problems, and that with these #restrictions in place, the #iPhone succeeds spectacularly in keeping almost all the usual bad guys out. But when the most #advanced #hackers do succeed in breaking in, something strange happens: Apple’s extraordinary defenses end up protecting the attackers themselves. While the iPhone’s security is getting tighter as Apple invests millions to raise the wall, the #best #hackers have their own millions to buy or develop #zero-#click #exploits that let them #take #over #iPhones #invisibly. These allow attackers to burrow into the restricted parts of the phone without ever giving the target any indication of having been compromised. And once they’re that deep inside, the #security becomes a #barrier that keeps #investigators from spotting or understanding nefarious behavior—to the point where investigators suspect they’re missing all but a small fraction of attacks because they cannot see behind the curtain.
Apple doesn’t allow #Mac #security #tools to #analyze the #memory of other #processes—preventing #apps from checking any room in the castle aside from their own. These #rules are meant to #safeguard #privacy and prevent #malware from #accessing #memory to #inject #malicious #code or #steal #passwords. But some hackers have responded by creating #memory-only #payloads — #code that exists in a place where #Apple doesn’t allow outside security tools to pry. It’s a game of hide and seek for those with the greatest skill and most resources.
It’s #not #just #Apple, says one investigator: “#Android is increasingly locked down. We expect both #Macs and ultimately #Windows will increasingly look like the #opaque #iPhone #model.”
#Google’s #Chromebook — which limits the ability to do anything outside the #web #browser — might be the most locked-down device on the market. #Microsoft, meanwhile, is experimenting with Windows S, a locked-down flavor of its #operating #system that is built for speed, performance, and security. These companies are stepping back from #open #systems because it works, and security experts know it.
The enemy knows the system, but you ‘know’ better.
– Dr. Yogesh Malhotra AI-ML-Quant-Cyber-Crypto-Quantum-Risk-SME’s reformulation of #Shannon’s #maxim, 2013:
Why #Encryption and #Crypto #Systems #Fail and How to #Preempt and #Prevent Such #Systems #Failures: #Cryptology beyond #Shannon’s #Information #Theory: Preparing for When the ‘Enemy Knows the System’: https://lnkd.in/dXZQmE6 :
AIMLExchange.com : BRINT.com : C4I-Cyber.com