Apple opens iOS 10 code: Why?

  • By Paul Rubell
  • 24 Jun, 2016

One of the guiding principles at Apple Inc. is to keep its software proprietary, closed and secret. Apple’s code is the antithesis to open source software. Steve Jobs zealously and jealously guarded Apple’s operating systems especially to prevent hackers, jailbreakers and the US and foreign governments from understanding exactly how Apple products function and operate. Tim Cook has followed in Steve’s path, securing Apple’s code and locking the door to outsiders.

Now comes the iPhone 7 and with it, a new mobile telephone operating system: iOS 10. To great surprise, the heart (called the kernel) of the computer program (called code) has been released without encryption. The kernel is a crucial part of the operating system. It manages security and restricts the ways that apps can access the hardware of the device.

The computing community initially thought that Apple had made a mistake by releasing its newest mobile iOS without imbedded security. Apple announced this week that it had not made a mistake.

According to the company’s spokesperson:

“The kernel cache doesn’t contain any user info, and by unencrypting it we’re able to optimize the operating system’s performance without compromising security.”

Was the open kernel approach really taken for the purpose of optimization? Some industry observers don’t think so. With decryption, developers and security researchers can look more closely at the iOS code than ever before in order to locate security flaws and bugs. Apple hopes that these experts will identify security holes and create fixes to patch the bugs.

Apple wants to eliminate the United States government’s numerous requests and court orders directing it to create “back doors” that would allow the FBI to peer deeply into an iPhone and locate personally identifiable information about the iPhone’s owner. Court orders were issued in the aftermath of the San Bernardino massacre during 2015. Apple does not want to re-live that experience. It does not want to run the risk once again of a judge directing it to assist the government with accessing customers’ protected and personal information.

What better way to deter the government from compelling Apple to dig deep into iPhones and furnish protected information, than for computer gurus around the world to inspect the kernel code and write fixes and patches? Apple hopes that its code and encryption will be stronger with the input of outsiders.

The stronger the encryption, the more protected is the data that rests on the phone. In addition, if code is open and freely available, the FBI will not have to go to court seeking intrusive writs and orders directed against Apple, with all the notoriety and publicity that goes along with it.

For the sake of being complete and clear, Apple has not made iOS an open source computer language. It would be illegal and infringing to copy the code and use it for one’s own products.

Apple owns the code. Now, you can look at it.

By Paul Rubell November 2, 2018
Cyberliability and privacy are very important to the food, beverage and hospitality industries. Today the industry faces many 21st century risks. Paul Rubell addresses these risks.
By Paul Rubell July 16, 2018
by Paul Rubell, Esq. Every company in the world that has a Facebook social media page may be subject to the European Union’s newly-enacted GDRP (General Data Protection Regulation) and the chokehold of EU law enforcement. Many businesses wrongly believe they are not collecting personal data via their Facebook pages but that is likely not […]
By Paul Rubell August 30, 2017
  by Paul Rubell, Esq. A 36-year old Chinese national from Shanghai has been indicted by a federal court in California for transmitting malicious software tools to companies located in the United States. Yu Pingan was arrested on August 27, 2017 when he arrived in the United States to attend a conference.  Pingan used the online pseudonym […]
By Paul Rubell April 29, 2017
Taking videos is a form of expression that is guaranteed by the Bill of Rights. However, even free speech has constitutional limits. For instance, if you shout "fire" in a crowded theater, you can be arrested and the 1st Amendment will not protect you.
By Paul Rubell April 17, 2017
by Paul Rubell, Esq. Can your business survive a massive data breach? If your business stores, backs up or syncs its data to the cyber cloud, take note. Apple’s iCloud is currently the subject of ransomware. As you will read, the moral to this article is that confidential business data, trade secrets, customer lists and […]
By Paul Rubell April 17, 2017
by Paul Rubell, Esq. Information is the currency of 2017. For this reason it is mission-critical to keep data currency safe, secure and private. Just as gold bricks should be stored in a physical safe, data needs to be kept secret electronically. Passwords are the key to enter the digital vault. Strong passwords are designed […]
By Paul Rubell March 16, 2017
Enjoy my newest article. You can read more on my blog at paulrubellblog.wordpress.com.
By Paul Rubell March 13, 2017
by Paul Rubell, Esq. Witness today’s risks of cyber crime.  Hackers, bad actors and foreign governments have long had the ability to assault our Nation. Current events have opened citizens’ eyes to the reality of the cyber threat. It is remarkable how the public has either forgotten or turned a blind eye to well-known security […]
By Paul Rubell March 3, 2017
By Paul Rubell, Esq. Internet users have been suddenly stripped of an important source of privacy protection.  On March 1, 2017, the Federal Trade Commission (FTC) and Federal Communications Commission (FCC) abruptly suspended the net neutrality rules that had been scheduled to go into effect on March 2nd.  Internet users in the United States have […]
By Paul Rubell February 16, 2017
by Paul Rubell, Esq. It is remarkable that many companies do not know the vastness of private information they obtain from their social media and website.  It is essential for every business to understand its legal responsibility to protect their customers’ personal information. OLD NEWS:  Web browsers can follow your voyage through the Internet. Firefox, Internet […]
More Posts