The One Device: The Secret History of the iPhone
Rate it:
Read between December 28 - December 31, 2019
62%
Flag icon
the episode gave rise to a number of pressing questions increasingly being asked of a society conducted on smartphones:
62%
Flag icon
How secure should our devices be? Should they be impenetrable to anyone but the user? Are there circumstances when the government should be able to gain access to a citizen’s private data—like, when that citizen is a known mass murderer?
62%
Flag icon
authorities are pursuing less sensational...
This highlight has been truncated due to consecutive passage length restrictions.
63%
Flag icon
This is a glitchy paradox of the moment.
63%
Flag icon
We share more information than ever across social networks and messaging platforms, and our phones collect more data about us than any mainstream device before—location data, fingerprints, payment info, and private pictures and files.
63%
Flag icon
But we have the same, or stronger, expectations of privacy as people di...
This highlight has been truncated due to consecutive passage length restrictions.
63%
Flag icon
So, to keep safe the things that hackers might want most—bank-account info, passwords—Apple d...
This highlight has been truncated due to consecutive passage length restrictions.
63%
Flag icon
“We want the user’s secrets to not be exposed to App...
This highlight has been truncated due to consecutive passage length restrictions.
63%
Flag icon
The Secure Enclave is “protected by a strong cryptographic master key from the user’s passcode… off...
This highlight has been truncated due to consecutive passage length restrictions.
63%
Flag icon
Basically, the enclave is a brand-new subcomputer built specifically to handle encryption and privacy without ever involving Apple’s servers.
63%
Flag icon
It’s designed to interface with your iPhone in such a way that your most crucial data stays private and entirely inaccessible to Apple, the government, or anyone else.
63%
Flag icon
As with most other modern electronics, hacking has helped shape the culture and contours of the products themselves.
63%
Flag icon
hacking has been around for as long as people have been transmitting information electronically.
63%
Flag icon
The culture of hacking, reshaping, and bending consumer technologies to one’s personal will is as old as the history of those technologies.
63%
Flag icon
The iPhone is not immune. In fact, hackers helped push the phone toward adopting its most successful feature, the App Store.
64%
Flag icon
“Every product starts out in an unknown state,”
64%
Flag icon
Apple, he says, “lacked a lot of exploit mitigations, they had lots of bugs in really critical services.”
64%
Flag icon
But that was to be expected. It was a new frontier, and there were going to be pitfalls.
64%
Flag icon
It took hackers only a day or two to break into the iPhone’s software.
64%
Flag icon
Remember the iPod lesson: Restricting users to Mac limits the audience.
64%
Flag icon
Jailbreaking became the popular term for knocking down the iPhone’s security system and allowing users to treat the device as an actual personal computer—letting them modify settings, install new apps, and so forth. But breaking in was only the first step.
64%
Flag icon
Hacking is a competitive sport.
64%
Flag icon
Collectives function a bit like pro teams; you can’t just show up with a ball and expect to play.
64%
Flag icon
Hackers have to prove t...
This highlight has been truncated due to consecutive passage length restrictions.
64%
Flag icon
“Apple has discovered that many of the unauthorized iPhone unlocking programs available on the internet cause irreparable damage to the iPhone’s software,
64%
Flag icon
which will likely result in the modified iPhone becoming permanently inoperable when a future Apple-supplied iPhone software update is installed.”
64%
Flag icon
Apple’s threat went unheeded.
64%
Flag icon
Apple patched the bug that enabled the TIFF exploit, setting off what would be a years-long battle. The iPhone Dev Team and other jailbreaking crews would find a new vulnerability and release new jailbreaks. The first to find a new one would get cred. Then Apple would fix the bug and brick the jailbroken phones.
64%
Flag icon
Over time, the jailbreaking community grew in size and stature.
64%
Flag icon
The Dev Team reverse-engineered the phone’s operating system to allow it to run third-party apps.
64%
Flag icon
It was the hackers who were pushing the device to become more like the creativity augmenter, the knowledge manipulator that Steve Jobs’s idol Alan Kay originally imagined mobile computing could be.
65%
Flag icon
The popularity of jailbreaking and Cydia provided a public demonstration of a palpable demand for, at the very least, a way to get new apps, and, at the most, a way to have more control over the device.
65%
Flag icon
it turns out that this kind of hacking was entirely legal,”
65%
Flag icon
While jailbreaking is not as sensational a practice as it once was—like any worthy tech endeavor, it’s been declared dead by the pundits multiple times—the
65%
Flag icon
the legacy of the jailbreakers remains.
65%
Flag icon
Perhaps more than anything, though, the jailbreakers demonstrated living, coded proof that there was immense demand for an App Store and that people would be able to do great things with it. Through their illicit innovation, they showed that the iPhone could become a vibrant, diverse ecosystem for doing more than making calls, surfing the web, and increasing productivity. And they showed that developers would be willing to go to great lengths to participate on the platform; and they didn’t just talk, they built a working model.
65%
Flag icon
Thus, the hacker iPhone Dev Team should get a share of at least some of the credit in Jobs’s decision to let the real iPhone Dev Team open the device to developers in 2008.
65%
Flag icon
Another legacy of the jailbreaking movement was that it drove Apple to focus on security with renewed vigor.
65%
Flag icon
“Consumers shouldn’t have to think about security,”
65%
Flag icon
They stopped playing cat-and-mouse with hackers and started rewriting the rules, setting out mousetraps long before the mice had a chance to sneak into the house.
65%
Flag icon
Nobody outside Apple knows for sure how the device works, just that it seems to. Really well.
65%
Flag icon
And it’s a good thing that Apple started upping its security game.
65%
Flag icon
The iPhone has been helped on this front, somewhat ironically, by the rise of Android phones.
65%
Flag icon
The iPhone may be the single most popular and profitable device on the planet, but it’s the only phone running the iOS operating system. Samsung, LG, Huawei, and other handset manufacturers all run Android.
65%
Flag icon
That gives Android around 80 percent of the mobile OS market share worldwide. And malicious hackers tend to try to maximize their time and...
This highlight has been truncated due to consecutive passage length restrictions.
65%
Flag icon
iPhone users update their phones in much larger proportions than Android users do.
65%
Flag icon
Apple’s more stringent app-approval process helps too.
66%
Flag icon
The iOS devices are the single most secure consumer devices available,
66%
Flag icon
“It is light-years ahead of every other trusted device that exists on the market.
66%
Flag icon
More and more people are using non-general-purpose computing devices, they’re using Kindles, iPads, ChromeBooks, iPhones, Apple TV, whatever, all these locked-down devices that serve one single purpose,”