Apple’s Lockdown Mode Aims to Counter Spyware Threats

Apple’s Lockdown Mode Aims to Counter Spyware Threats

Apple’s Lockdown Mode Aims to Counter Spyware Threats

Starting with iOS 16, people who are at risk of being targeted with spyware will have some much-needed help.

THE SURVEILLANCE-FOR-HIRE INDUSTRY has emerged in recent years as a very real threat to activists, dissidents, journalists, and human rights defenders around the world, as vendors offer increasingly invasive and effective spyware to governments. The most sophisticated of these tools, like NSO Group’s notorious Pegasus spyware, target victims’ smartphones using rare and sophisticated exploits to compromise Apple’s iOS and Google’s Android mobile operating systems. As the situation has deteriorated for victims, activists and security experts have increasingly called for more drastic measures to protect vulnerable individuals. Now Apple has an option.

Today, Apple is announcing a new feature for its upcoming iOS 16 release called Lockdown Mode. Apple emphasizes that the feature was created for a small subset of users who are at high risk of government targeting, and it doesn’t expect the feature to be widely adopted. But for those who want to use it, the feature is an alternate mode of iOS that heavily restricts the tools and services that spyware actors target to take control of victims’ devices.

“This is an unprecedented step for user security for high-risk users,” Ron Deibert, director of the University of Toronto’s Citizen Lab said on a call with reporters ahead of the announcement. “I believe that this will throw a wrench into their modus operandi. I expect [spyware vendors] to try to evolve, but hopefully, this feature will prevent some of those harms from happening down the road.”


Lockdown Mode is a separate operating system mode. To turn it on, users enable the feature in the Settings menu and then are prompted to restart their device for all of the protections and digital defenses to fully take effect. The feature imposes limitations on the leakiest parts of the operating system sieve. Lockdown Mode attempts to comprehensively address threats from web browsing, for example, by blocking many speed and efficiency features that Safari (and WebKit) use to render webpages. Users can specifically mark a certain webpage as trusted so it loads normally, but by default, Lockdown Mode imposes a host of restrictions that extend anywhere WebKit is working behind the scenes. In other words, when you load web content in a third-party app or an iOS app like Mail, the same Lockdown Mode protections will apply. 

Lockdown Mode also limits all sorts of incoming invitations and requests, unless the device has previously initiated a request. That means your friend won’t be able to call you on FaceTime, for example, if you’ve never called them. And to take it one step further, even when you initiate an interaction with another device, Lockdown Mode only honors that connection for 30 days. If you don’t talk to a particular friend for weeks after that, you’ll need to reestablish contact before they can reach out to you again. In Messages—a frequent target of spyware exploitation—Lockdown Mode won’t show link previews and will block all attachments with the exception of a few trusted image formats.

Austin Peter
Austin Peter

I am a 23 year old Electronics Engineer. I am also a travel enthusiast and also a webmaster. Please, help my site grow for a better service. Do contact me for financial donations and supports of any kind.

NB: I own this website for I created it from scratch. Although I am currently in partnership with Oset Ventures Group.

Articles: 243

Leave a Reply

Your email address will not be published. Required fields are marked *

Verified by MonsterInsights