Apple alerts exploit developer that his iPhone was targeted with gov spyware

Skepticism about the Story and Framing

  • Several commenters see the article as “he said / company said” and possibly tied to a wrongful-termination dispute, not a clean security case study.
  • Multiple people note exploit developers have been prime spyware targets for decades, so presenting this as a “first documented case” suggests the reporter is unfamiliar with the field.
  • Some think parts of the account feel embellished or “made up,” or that the person is a relatively low‑level player.

“Leopards Ate My Face” vs Sympathy

  • A large subthread debates whether this is a “you reap what you sow” moment: someone who built offensive tools being targeted by similar tools.
  • Others push back, comparing this to a car engineer dying in a crash: working on dual‑use technology doesn’t automatically make you deserving of harm.
  • There’s criticism that the subject appears shocked and fearful for himself without acknowledging what his tools do to journalists, dissidents, and others.

Who’s the Attacker: State or Employer?

  • Some think a government customer is the obvious suspect; others argue the former employer (or its leadership) has both motive and capability to surveil ex‑employees.
  • Comments highlight that such firms may use their own exploits on staff or candidates for vetting or leverage, despite legal risks, and likely enjoy de facto protection from prosecution.
  • Attribution is widely acknowledged as unclear and probably unresolvable from the public details.

OPSEC, Phones, and Apple’s Role

  • Debate over whether “buying a new iPhone” helps:
    • Pro side: you get a temporarily clean slate and can enable Lockdown Mode.
    • Con side: a serious state‑level adversary can quickly re‑target via contacts, networks, or location; only radical lifestyle changes meaningfully reduce exposure.
  • Suggestions range from multiple‑phone setups to heavily locked‑down, de‑googled Android devices and minimizing smartphone use.
  • People are curious how Apple detects such attacks; speculation includes inspection of iMessage/notification traffic and comparison against known exploit patterns. Apple’s notification wording is seen as oddly spam‑like but the delivery path (device + account) is viewed as trustworthy.

Ethics and the Exploit Market

  • Some commenters refuse to do commercial exploit work, citing its use against vulnerable populations and lack of control over end‑users.
  • Others argue the capability will exist globally regardless; if one country abstains, others will not, and it’s still possible to defend against most cyberattacks (unlike nukes).
  • A recurring theme is that this sector self‑selects for people comfortable with opaque, morally gray operations, which erodes trust even inside these organizations.