In an unprecedented move, Apple, a company known for its blockbuster products as much as keeping their technological feats a closely guarded secret, has quietly released a document detailing the security features supported and hidden inside its iOS mobile operating system which runs on iPod Touch, iPhones and iPads.
Security watchdogs are hailing Apple’s move in releasing the iOS security guide as a watershed moment in the history of Apple’s public disclosures on matters relating to their software architecture. Much had been guessed about Apple’s mobile operating system in the past, but never confirmed by Apple, until the iOS security guide was floated in public domain late last month.
The iOS security guide is fairly detailed, giving businesses and iOS developers much-needed insight into the security features inherent within the iOS platform. The idea seems to be to educate third-party developers so that they develop secure apps for iOS users and the entire ecosystem benefits from Apple’s revelations.
Broadly, the iOS security document deals with the following topics:
There’s some interesting revelations from the iOS security guide. For example, the fact that at every stage of an iOS device’s boot process, the different software components involved in booting (kernel, etc.) have to be digitally signed by the relevant hardware components. This makes iOS security one of the best out there.
Researchers have been busy reverse-engineering and second-guessing iOS’ features for several years, and for them most of the features discussed by Apple in the iOS security guide aren’t new.
According to a Kaspersky Lab news website, Charlie Miller, co-author of iOS Hacker’s Handbook, suggested that while there isn’t a lot of new information in the Apple security guide, its publication is still an important event.
If you want to download the PDF document on iOS Security, click here.