Hacker Newsnew | past | comments | ask | show | jobs | submit | varispeed's commentslogin

It makes sense if you want to avoid tax. You can put artificial costs and deduct them. Nobody is going to go to space and check.

On the other hand I feel like 5.2 gets progressively dumbed down. It used to work well, but now initial few prompts go in right direction and then it goes off the rails reminding me more of a GPT-3.5.

I wonder what they are up to.


From childhood I remember there was a guy who was blasting loud music whole day. He wouldn't stop, so one neighbour got so angry he took an axe, demolished this guy's door, took his stereo and launched it through the window, through the glass. Fortunately it landed in the garden on the other side. Then he said next time he will chop him up and throw through the window. That was the end of nuisance. Police came, but all the neighbours said they didn't hear anything and the guy did it himself, must have gone insane.

I do not know in what country you live, but in the countries I lived in if you chop somebody's property you will go to jail.

But the guy did it himself. Must have gone insane.

Ignoring the entirety of the rest of this story, I desperately want to know why: "Fortunately it landed in the garden on the other side." was so notable.

Because it didn't land on someone's head?

Yeah, I read this as "fortunately it didn't land on anyone and didn't damage any valuable property." (Value judgements about gardens aside...)

"The victim did it to themselves" is a famously bulletproof defense. I don't know why people don't try it more often.

This is the typical tall tale that used to travel in every neighborhood as a warning, especially to scare kids from doing some things. Kids eat up these stories. Probably doesn't work that much in the age of phones and "pics (shorts?) or it never happened".


Unfortunately, we’ve reached the era where pics and shorts are very much no longer proof. In a few minutes you could generate video of that exact scenario.

These sanctions make no difference, except make people say things like you say.

No mention of Pegasus and other software of such sort. Can latest iOS still be infected?

There is no point creating such document if elephant in the room is not addressed.


Apple's head of SEAR (Security Engineering & Architecture) just gave the keynote at HEXACON, a conference attended by the companies who make Pegasus such as NSO Group.

That doesn't seem like avoiding the elephant in the room to me. It seems like very much acknowledging the issue and speaking on it head-on.

https://www.youtube.com/watch?v=Du8BbJg2Pj4


Pegasus isn't magic. It exploits security vulnerabilities just like everything else. Mitigating and fixing those vulnerabilities is a major part of this document.

Why? The obvious conclusion is that Apple is doing everything in its power to make the answer “no.”

You might as well enumerate all the viruses ever made on Windows, point to them, and then ask why Microsoft isn’t proving they’ve shut them all down yet in their documents.


That analogy misses the asymmetry in claims and power.

Microsoft does not sell Windows as a sealed, uncompromisable appliance. It assumes a hostile environment, acknowledges malware exists, and provides users and third parties with inspection, detection, and remediation tools. Compromise is part of the model.

Apple’s model is the opposite. iOS is explicitly marketed as secure because it forbids inspection, sideloading, and user control. The promise is not “we reduce risk”, it’s “this class of risk is structurally eliminated”. That makes omissions meaningful.

So when a document titled Apple Platform Security avoids acknowledging Pegasus-class attacks at all, it isn’t comparable to Microsoft not listing every Windows virus. These are not hypothetical threats. They are documented, deployed, and explicitly designed to bypass the very mechanisms Apple presents as definitive.

If Apple believes this class of attack is no longer viable, that’s worth stating. If it remains viable, that also matters, because users have no independent way to assess compromise. A vague notification that Apple “suspects” something, with no tooling or verification path, is not equivalent to a transparent security model.

The issue is not that Apple failed to enumerate exploits. It’s that the platform’s credibility rests on an absolute security narrative, while quietly excluding the one threat model that contradicts it. In other words Apple's model is good old security by obscurity.


I am not sure if you missed my earlier comment, but it's directly applicable to this point you've repeatedly made:

>If Apple believes this class of attack is no longer viable, that’s worth stating.

To say it more directly this time: they do explicitly speak to this class of attack in the keynote that I linked you to in my previous comment. It's a very interesting talk and I encourage you to watch it:

https://www.youtube.com/watch?v=Du8BbJg2Pj4


On some random YouTube video that is mostly consisting of waffle and meaningless information like "95% of issues are architecturally prevented by SPTM". It's a quite neat and round number. Come on dude.

[flagged]


It’s not “a weakness.” It’s many weaknesses chained together to make an exploit. Apple patches these as they are found. NSO then tries to find new ones to make new exploits.

Apple lists the security fixes in every update they release, so if you want to know what they’ve fixed, just read those. Known weaknesses get fixed. Software like Pegasus operates either by using known vulnerabilities on unpatched OSes, or using secret ones on up to date OSes. When those secret ones get discovered, they’re fixed.


don't worry, they set the allow_pegasus boolean to false

Apple did create a boolean for that. They call it lockdown mode.

> Lockdown Mode is an optional, extreme protection that’s designed for the very few individuals who, because of who they are or what they do, might be personally targeted by some of the most sophisticated digital threats. Most people are never targeted by attacks of this nature. When Lockdown Mode is enabled, your device won’t function like it typically does. To reduce the attack surface that potentially could be exploited by highly targeted mercenary spyware, certain apps, websites, and features are strictly limited for security and some experiences might not be available at all.


If Pegasus can break the iOS security model, there’s no reason to think it politely respects Lockdown Mode. It’s basically an admission the model failed, with features turned off so users feel like they’re doing something about it.

Lockdown mode works by reducing the surface area of possible exploits. I don't think there's any failures here. Apple puts a lot of effort into resolving web-based exploits, but they can also prevent entire classes of exploits by just blocking you from opening any URL in iMessage. It's safer, but most users wouldn't accept that trade-off.

Claiming reduced attack surface without showing which exploit classes are actually eliminated is faith, not security.

And Lockdown Mode is usually enabled _after_ user suspects targeting.


If you did RTFA for this story, you’ll see on page 67 what I pasted with a link to the support article describing to end users exactly what’s blocked. It does greatly reduce the attack surface.

For context, internet has been nerfed in the UK, because of Epstein scandal politicians there started thinking too much of the children.

online.net is quite close.

Why not just say Scaleway?

Thanks. I meant to say, but it's always been online.net for me. Can't get used to Scaleway.

Microsoft is building better chains for corporate slaves.

Surely that means soon everyone will have to wear ankle monitor?

Think of the children!

> what it is that make IT people get a job there?

The job market is toast, so people take whatever they can.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: