I didn’t know this app existed. Anyway, the project was discontinued.
I didn’t know this app existed. Anyway, the project was discontinued.
That’s true, all devices are hackable, there’s no 100% protection.
No tool is perfect, but if that’s a security improvement, it might be worth enabling.
I know of at least one instance where lockdown mode protected a user from NSO spyware.
A Citizen Lab’s research confirmed it:
For a brief period, targets that had enabled iOS 16’s Lockdown Mode feature received real-time warnings when PWNYOURHOME exploitation was attempted against their devices. Although NSO Group may have later devised a workaround for this real-time warning, we have not seen PWNYOURHOME successfully used against any devices on which Lockdown Mode is enabled.
It is encouraging to see that Apple’s Lockdown Mode notified targets of in-the-wild attacks. While any one security measure is unlikely to blunt all targeted spyware attacks, and security is a multi-faceted problem, we believe this case highlights the value of enabling this feature for high-risk users that may be targeted because of who they are or what they do.
Can any of them prevent a Pegasus-style attack?
If I understand correctly, Apple does it by disabling common attack vectors, remote fonts for example.
If an app on one device connects to an app on another via Veilid, it shouldn’t be possible for either client to know the other’s IP address or location from that connectivity, which is good for privacy, for instance. The app makers can’t get that info, either.
Is that considered a new thing? I don’t think I’ve ever encountered a P2P service/protocol that also masks IP addresses.
Did you get any spam calls?
Use FreeTube?