TechCrunch, an international tech media outlet, reports that a top Apple engineer informed him that the Lockdown mode has been extensively tested since its launch over a year ago and that no input or evidence of a breach has been received at this time.
Lockdown is built to offer a high level of optional security to a limited group of users. Extremely sophisticated cyber threats, such as assaults by private organizations like NSO Group, which create spyware for the state, may target these people due to their identities or the nature of their jobs. To prevent highly targeted spyware from getting an opportunity, you can turn on Lockdown mode in iOS 16, iPad OS 16, and macOS Ventura. This will further tighten device protection, severely limit some capabilities, and greatly reduce the attack surface.
When Lockdown mode is released, it will come with these security features:
When it comes to messages, we’ll be blocking most attachment types (except photographs). There will be some limitations, such as the inability to preview links.
Unless the user has already started the call or request to the other party, Apple services may intercept invitations and service requests, including FaceTime calls, that are made to users.
You won’t be able to use your computer or any of your devices with a wired connection when you lock your iPhone.
When you enable Lockdown mode, you won’t be able to install configuration files or add the device to Mobile Device Management (MDM).
In April of this year, researchers heard back from users that Lockdown mode had successfully protected human rights defenders from an assault.
Former Egyptian lawmaker Ahmed Eltantawy was able to protect himself from the Predator spyware attack in September, according to Citizen Lab and Apple.