Do you remember the Zero-Click attacks that affected a number of iPhone users on a large scale in recent years? It seems that it will become more complicated and it will not be easy to create attacks of this type after the security updates that Apple made in iOS 14.5, and let's get to know the updates And the changes that Apple has made and what is their benefit.
What is a zero-click vulnerability?
A vulnerability exists in a product that has not been discovered or monitored before, and it can be described as one of the most powerful types of attacks on any type of device because it is unknown and through it it is possible to control and penetrate the phone device without the need for any interaction by the user in order to activate it.
This attack was used during previous years. In 2016, hackers working for the UAE obtained a zero-click exploit in the iMessage application and called it “Karma” and allowed them to penetrate many iPhones of specific people and in 2018, the spy company NSO Group ( The owner of the Pegasus program) offered a set of spy tools that provide zero-click attacks for sale and at the end of last year, these tools were used and many journalists hacked iPhones with a zero-click attack.
What did Apple do
The company has quietly made a new change in the way it secures the code running in its mobile operating system, the change in the iOS 14.5 beta which means it will be added to the final system.
Motherboard spoke with the developers of vulnerabilities and malware about the matter, and many of these specialists in discovering security vulnerabilities for the iPhone system believe that these changes made by Apple will make it very difficult for hackers to control the iPhone by zero-click technology. .
And one of the loophole developers who works for the government said, sandboxes will be more difficult for a zero-click attack, meaning sandboxes that isolate applications from each other in an attempt to stop the interaction of a single program and prevent its impact on the system as a whole.
The change revolves around something known as ISA indicators, which is a feature associated with the code of the iOS operating system that tells the program which code to use when running it, and until now, those indicators were not protected by PAC technology or index authentication codes that protect iPhone users from operations. Exploitation that works by publishing malicious code, as these codes prevent hackers from exploiting memory corruption errors, but the changes made by Apple added PAC technology to the ISA indicators.
Point of view
What Apple did in short is that it changed the way the operating system hides your code, but what really matters is that it has developed its own basic security models based on the premise of mutual distrust in security areas. The idea here is that each element in the security chain works independently, gathers a little bit of user information, and is built with a distrust model that helps enhance security flexibility and gives the iPhone user very strong protection, however this change makes zero-click attacks harder than ever. It means it will become impossible. It is now up to the hackers to find new technologies, in the end, no system is without vulnerabilities, but Apple wants to make these vulnerabilities as difficult as possible.
Source:
Thank you for the effort  
Brother Mahmoud
What safety are you talking about, my friend ?? !!!
All locked Android devices with FRP or Google account, we open them directly without any trouble !!
Where is the safety?
If the iPhone has closed iCloud and reported it as stolen, forget someone who can open it, and sometimes we open locked Android devices without losing files This applies to Android versions 10 and below and Android 11 vulnerabilities are still working on finding more vulnerabilities is still ongoing
This is a simple example of the issue of safety
Thank you for the clarification and thank you to Apple for the interest and interaction to close the loophole
Brother Mahmoud
The last thing I can use is Android ,,
😅
Android, everything in it is miserable
Google Play Store, I can’t look at it ugly in the sense of the word ,, the equipment is a mess ,, applications no words ,,
You want to continue if you have enough
Brother Nasser
The Android that exists today is not the same as the Android 10 years ago, it has changed 180 degrees.
Either in terms of quality, safety, or ..
Maybe some people prefer iOS, but Android 11 changed all concepts and fixed all the old mistakes.
Wonderful and very beautiful system
Jailbreak 🤣 Ava they had already left iPhone today, a copy of Cydia with all its tools, they stole all the ideas from Cydia
Second Cydia World, Babylon Every year you take Cydia tools and add them to the system
The most difficult thing is the task of the jailbreak team in the future 😅
IPhone without jailbreak is boring 😅
For a while, people use jailbreak 😳
My brother Nasser, yes, you believe, the iPhone without jailbreak is boring, but it is very boring
That is why we use the Android system, because you can control your phone however you want
Important development, technical support from the company and the provision of protection tools will not suffice. The most important thing is awareness and alerting the user about what he grants permission and checking requests for any program to grant permission, and even open a link, message or enter a code, the user must check more than once in order to Don't get involved, and if the user does not have enough knowledge, he should seek help from those close to him
Do not forget that the Apple system rotates on the vPN service that collects all the data and sends it to Apple's servers to collect data in order to sell ads and sell data to third parties, meaning that vpn does not provide you with protection in Apple devices from Apple itself The sender data is not encrypted
Good morning, thank you. It is very important. Why did Apple not put down the Bond Box system in the first place? If the matter was not behind spying on people 🤨 for advertisements, the support box, in order to prevent Apple from tracking the contents of the SMS, for sure in the second open holes that benefit governments and companies that have not been disclosed.
Why is Mason code the most difficult code?