Apple alerts exploit developer that his iPhone was targeted with gov spyware
Skepticism about the Story and Framing
- Several commenters see the article as “he said / company said” and possibly tied to a wrongful-termination dispute, not a clean security case study.
- Multiple people note exploit developers have been prime spyware targets for decades, so presenting this as a “first documented case” suggests the reporter is unfamiliar with the field.
- Some think parts of the account feel embellished or “made up,” or that the person is a relatively low‑level player.
“Leopards Ate My Face” vs Sympathy
- A large subthread debates whether this is a “you reap what you sow” moment: someone who built offensive tools being targeted by similar tools.
- Others push back, comparing this to a car engineer dying in a crash: working on dual‑use technology doesn’t automatically make you deserving of harm.
- There’s criticism that the subject appears shocked and fearful for himself without acknowledging what his tools do to journalists, dissidents, and others.
Who’s the Attacker: State or Employer?
- Some think a government customer is the obvious suspect; others argue the former employer (or its leadership) has both motive and capability to surveil ex‑employees.
- Comments highlight that such firms may use their own exploits on staff or candidates for vetting or leverage, despite legal risks, and likely enjoy de facto protection from prosecution.
- Attribution is widely acknowledged as unclear and probably unresolvable from the public details.
OPSEC, Phones, and Apple’s Role
- Debate over whether “buying a new iPhone” helps:
- Pro side: you get a temporarily clean slate and can enable Lockdown Mode.
- Con side: a serious state‑level adversary can quickly re‑target via contacts, networks, or location; only radical lifestyle changes meaningfully reduce exposure.
- Suggestions range from multiple‑phone setups to heavily locked‑down, de‑googled Android devices and minimizing smartphone use.
- People are curious how Apple detects such attacks; speculation includes inspection of iMessage/notification traffic and comparison against known exploit patterns. Apple’s notification wording is seen as oddly spam‑like but the delivery path (device + account) is viewed as trustworthy.
Ethics and the Exploit Market
- Some commenters refuse to do commercial exploit work, citing its use against vulnerable populations and lack of control over end‑users.
- Others argue the capability will exist globally regardless; if one country abstains, others will not, and it’s still possible to defend against most cyberattacks (unlike nukes).
- A recurring theme is that this sector self‑selects for people comfortable with opaque, morally gray operations, which erodes trust even inside these organizations.