From Pegasus to Predator – The evolution of commercial spyware on iOS [video]
Commercial spyware landscape and NSO/Pegasus
- Pegasus/Predator are seen as important but not “state of the art” anymore; they are only the visible part of a much larger commercial network exploitation (CNE) industry.
- Many vendors (often unknown publicly) sell exploit chains and “implant stacks” (rootkit-like persistent malware) to government agencies worldwide.
- Commercial spyware is considered highly cost‑effective versus traditional human intelligence; even large cost increases may not meaningfully reduce its use.
Lockdown Mode on iOS
- Strong advocacy for turning on Lockdown Mode for at-risk users to cut large areas of attack surface (JIT, complex media formats, link previews, rich messaging, WebGL/WebRTC, etc.).
- It is reported to be actively maintained and expanded by Apple, with ongoing exploit notifications.
- Downsides: breaks some mainstream apps (e.g., support chat), disables newer media formats (e.g., AVIF), and interferes with family-sharing workflows. Many argue ordinary users won’t accept the usability hit.
Defensive posture: iOS vs Android
- iOS: very locked down, making kernel‑level forensics and live malware extraction on production devices “quite difficult.” Defensive tooling is viewed as still in a “stone age.”
- Android: ongoing hardening with Rust, memory tagging, hardened allocators, pKVM, and eBPF, but drivers remain a major weak point. Fragmented OEM update practices are seen as a serious security liability versus Apple’s faster, longer update support.
- Some think users should “assume compromise”; others argue that’s too simplistic and not actionable. Threat modeling and realistic attacker cost are emphasized.
Detection, forensics, and EDR limits
- Traditional EDR, scanning, and behavioral detection (even using eBPF/XDP) are argued to be largely ineffective against kernel-level or ring‑0 implants that can tamper with telemetry.
- Counter‑argument: eBPF/XDP can still help block or detect some malicious packets, but critics maintain it cannot reliably defend against a fully compromised kernel.
Societal and policy implications
- Spyware is used against journalists, activists, and even heads of state; yet political and economic consequences for offenders have been minimal, which signals profitability.
- Nearly every reasonably wealthy state is said to be a customer of spyware/CNE vendors, making strong international restrictions unlikely.
- Some call for treating commercial spyware use as a terrorism-level offense, but others argue states depend on these tools and won’t meaningfully regulate them.
Backups, ransomware, and Time Machine
- Time Machine is not regarded as reliable protection against ransomware in all setups; if the backup share is writable and reachable, ransomware can encrypt backups too.
- In practice, off-device/versioned backups (e.g., remote NAS, cloud with history) can help, but are not a guarantee.
Apple privacy and telemetry concerns
- Criticism of Apple’s online certificate checks and M1-era mechanisms as “built-in spyware” that can’t be fully disabled.
- Others link to more measured technical critiques but still treat the behavior as problematic from a privacy standpoint.
Other topics
- Audio issues in the conference video made it hard to follow; some shared cleaned-up audio.
- Complaints about slide-reading presentation style and references to critiques of PowerPoint.
- Web and app developers express frustration with testing on iOS (Safari-only engine, tooling limits) and with general search engine decline.
- Note that disabling 2G on Android is easy on high-end devices but often hidden or removed on cheaper models, though it can be toggled via hidden service codes.