this post was submitted on 21 Feb 2024
86 points (95.7% liked)
Apple
17500 readers
48 users here now
Welcome
to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!
Rules:
- No NSFW Content
- No Hate Speech or Personal Attacks
- No Ads / Spamming
Self promotion is only allowed in the pinned monthly thread
Communities of Interest:
Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple
Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode
Community banner courtesy of u/Antsomnia.
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Um... What? iPhone apps run in a sandbox. They can't access anything. They can't even run at all unless the user launches the app or interacts with a notification. Background running is strictly limited to things like music playback with very few exceptions (exceptions which are taken away if the user never launches the app).
And for the record, I don't own an android phone and never have.
...do you know what enforces all of that?
The App store...
Specifically it limits what APIs can and can't be used by apps and forces the use of entitlements to access features of the hardware.
Downvote if you want, but entitelements are part of the code signing process which this article is trying to avoid. And jailbroken apps already don't have the protections you're talking about.
It's not uncommon for people to datamine not public API all over Apple's frameworks and the only thing preventing the usage is App Store policies and static analysis tools.
Umm… no? The phone operating system (iOS) enforces sandboxing. You can not run anything outside the sandbox without some exploit, at which point we have a completely new discussion.
Look up code signing and entitlements. This is a compile-time thing and an App store validation thing.
Regardless, what are you even arguing?
All of the sandboxing and entitlements stuff boils down to asking the user for permissions to access the data I described.
An app designed to look exactly like Facebook or Tik-tok, installed from a nefarious or less secure app store would reasonably expect to access contacts, the mic and camera, the username and password for that app, and a lot of other data that it can send to a server and use in ways that will negatively affect lots of people.