{"id":27620,"date":"2019-12-19T14:43:51","date_gmt":"2019-12-19T19:43:51","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=27620"},"modified":"2020-07-03T16:50:41","modified_gmt":"2020-07-03T20:50:41","slug":"apple-platform-security-guide-fall-2019","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2019\/12\/19\/apple-platform-security-guide-fall-2019\/","title":{"rendered":"Apple Platform Security Guide (Fall 2019)"},"content":{"rendered":"<p><a href=\"https:\/\/manuals.info.apple.com\/MANUALS\/1000\/MA1902\/en_US\/apple-platform-security-guide.pdf\">Apple<\/a> (PDF, via <a href=\"https:\/\/twitter.com\/rosyna\/status\/1207704031285542912\">Rosyna Keller<\/a>):<\/p>\n<blockquote cite=\"https:\/\/manuals.info.apple.com\/MANUALS\/1000\/MA1902\/en_US\/apple-platform-security-guide.pdf\"><p>This documentation provides details about how security technology and features are implemented within Apple platforms. It also helps organizations combine Apple platform security technology and features with their own policies and procedures to meet their specific security needs.<\/p>\n<p>[&#8230;]<\/p>\n<p>Apple continues to push the boundaries of what is possible in security and privacy. For example, Find My uses existing cryptographic primitives to enable the groundbreaking capability of distributed finding of an offline Mac &mdash; without exposing to anyone, including Apple, the identity or location data of any of the users involved. To enhance Mac firmware security, Apple has leveraged an analog to page tables to block inappropriate access from peripherals, but at a point so early in the boot process that RAM hasn&rsquo;t yet been loaded. And as attackers continue to increase the sophistication of their exploit techniques, Apple is dynamically controlling memory execution privileges for iPhone and iPad by leveraging custom CPU instructions &mdash; unavailable on any other mobile devices &mdash; to thwart compromise. Just as important as the innovation of new security capabilities, new features are built with privacy and security at their center of their design.<\/p><\/blockquote>\n\n<p>There&rsquo;s also a <a href=\"https:\/\/support.apple.com\/guide\/security\/welcome\/web\">Web version<\/a>.<\/p>\n\n<p>See also: <a href=\"https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Krstic-Behind-The-Scenes-Of-IOS-And-Mas-Security.pdf\">Behind the Scenes of iOS and Mac Security<\/a>.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/11\/07\/apples-new-privacy-page\/\">Apple&rsquo;s New Privacy Page<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2018\/09\/20\/ios-12-security-guide\/\">iOS 12 Security Guide<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2018\/08\/24\/apple-security-white-papers\/\">Apple Security White Papers<\/a><\/li>\n<\/ul>\n\n<p id=\"apple-platform-security-guide-fall-2019-update-2019-12-20\">Update (2019-12-20): <a href=\"https:\/\/twitter.com\/lapcatsoftware\/status\/1207738529670975488\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/lapcatsoftware\/status\/1207738529670975488\">\n<p>Apple security folks, what does this mean? Is it a typo? apps that are <em>not<\/em> using Full Disk Access?<\/p>\n<\/blockquote>\n\n<p id=\"apple-platform-security-guide-fall-2019-update-2019-12-23\">Update (2019-12-23): Perhaps it&rsquo;s worded correctly, and the point is that apps can no longer access data or executable code that happens to be in the trash. Users don&rsquo;t intend for the trash to be shared storage, but that&rsquo;s what it ends up being without addtional protections.<\/p>\n\n<p>See also: <a href=\"https:\/\/twitter.com\/radian\/status\/1207871162287611906\">Ivan Krsti&#x107;<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Apple (PDF, via Rosyna Keller): This documentation provides details about how security technology and features are implemented within Apple platforms. It also helps organizations combine Apple platform security technology and features with their own policies and procedures to meet their specific security needs. [&#8230;] Apple continues to push the boundaries of what is possible in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2019-12-19T20:06:05Z","apple_news_api_id":"4c7d6424-3efd-4dba-a61b-fc0149f4d355","apple_news_api_modified_at":"2020-07-03T20:50:44Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAg==","apple_news_api_share_url":"https:\/\/apple.news\/ATH1kJD79TbqmG_wBSfTTVQ","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[1821,31,1667,30,1666,48,1960],"class_list":["post-27620","post","type-post","status-publish","format-standard","hentry","category-technology","tag-find-my","tag-ios","tag-ios-13","tag-mac","tag-macos-10-15","tag-security","tag-transparency-consent-and-control-tcc"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/27620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=27620"}],"version-history":[{"count":4,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/27620\/revisions"}],"predecessor-version":[{"id":27667,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/27620\/revisions\/27667"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=27620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=27620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=27620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}