Skip to main content
banner image
venafi logo

Is Apple starting a new era of collaborative security?

Is Apple starting a new era of collaborative security?

Apple's open kernel means more security
October 13, 2016 | Scott Carter

iOS 10 is here, and Apple has taken the landmark step with this release. The ‘kernel' – the central core of the OS itself – has been left unencrypted making it readable for anyone that knows where to look. In a recent article in Australia’s PC & Tech Authority, Venafi Chief Strategy Officer Kevin Bocek looks under the hood of iOS 10 to understand why Apple is finally exposing its kernel.

Bocek writes, “The fact the kernel is unencrypted isn't in itself unique – in fact, Apple is a bit late to the game; Microsoft and Linux kernels were always unencrypted. Apple has always thought differently about protecting its core. So it leaves us wondering: why has Apple reversed its policy now? Why does it matter to any of us anyway?

The real story is a fight over privacy and who will control our mobile devices. Apple is in fact waving its middle finger in the face of government to protect privacy and security. This is something that all of us must pay close attention to. You may be surprised what powers our governments have and where they're going to take us.”

Read the rest of the story to learn how Apple’s leaving the kernel unencrypted may actually make it more secure, and make us safer.

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

Déjà Vu at LinkedIn: Second TLS Certificate Expiry in 2 Years

Déjà Vu at LinkedIn: Second TLS Certificate Expiry in 2 Years

Prepare this presentation and send it to me, once approved you can teach entire team.

Overheard at Machine Identity Protection Global Summit 2019

machine identity protection

Leaders Underscore the Critical Nature of Machine Identity Protection at Inaugural Global Summit

About the author

Scott Carter
Scott Carter

Scott Carter writes for Venafi's blog and is an expert in machine identity protection.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat