home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.sys.mac.advocacy      Steve Jobs fetishistic worship forum      120,746 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 119,395 of 120,746   
   Marian to Tyrone   
   Security Is Far More Comprehensive Than    
   21 Dec 25 22:06:24   
   
   XPost: misc.phone.mobile.iphone   
   From: marianjones@helpfulpeople.com   
      
   Tyrone said:   
   >>  e. You and I use completely different definitions of phone "security"   
   >>     etc.   
   >   
   > Yes.  I use multiple sites (some that YOU provided in your attempt to show   
   > that Android is more secure) that ALL show that the vast majority of security   
   > issues/malware happen on Android.  You use a single site that says iOS had 3   
   > more zero-day patches than Android last year.  Even with that, iOS is STILL   
   > way less likely to be infected. Thus, iOS is way more secure than Android.   
   >   
   > So obviously, you are going to continue your absurd, undocumented claims.  No   
   > one is shocked. As you stated, ignoring facts is not what adults do.   
      
   No serious security expert claims "iOS is way more secure".   
   There isn't one in the entire world, in fact, that you can find.   
      
   It's obvious why.   
   There isn't a professional security researcher on the planet who says that.   
      
   It's only Apple marketing that implies that.   
   Not serious researchers.   
      
   You are apparently attempting to reduce a very complex subject to a single   
   metric (malware prevalence), and that is not how security professionals   
   evaluate operating system security. Malware rates are not the definition of   
   security. They are one symptom of a much larger system.   
      
   Here are some of the much more complicated facts that matter:   
      
   CISA KEV data does not show iOS as "way more secure." When you query the   
   CISA Known Exploited Vulnerabilities database, iOS and Android have roughly   
   similar numbers of actively exploited CVEs over time. That is the only U.S.   
   government maintained list of real-world, in-the-wild exploited   
   vulnerabilities. It does not show iOS as dramatically safer.   
      
   Zero-day exploitation rates do not show iOS as "way more secure." Google   
   Project Zero's annual reports show that Apple repeatedly ships code that   
   has never been fuzzed or tested with modern techniques. Project Zero has   
   publicly stated that Apple's code quality and testing coverage lag behind   
   industry best practices. Again, this is not my opinion; it is documented   
   research.   
      
   iOS's monolithic update model slows down patch deployment. Before Rapid   
   Security Responses existed, any fix to any system component required a full   
   OS rebuild and full QA cycle. That is why iOS historically took longer to   
   patch certain classes of bugs. Android's modular architecture (APEX,   
   Mainline, Play Services) allows many components to be patched   
   independently. Update speed is a major part of security.   
      
   Malware statistics do not prove OS-level security.   
   Malware prevalence is heavily influenced by:   
    a. market share   
    b. sideloading behavior   
    c. user behavior   
    d. distribution channels   
    e. regional differences   
      
   Furthermore, mere economic incentives for attackers Malware rates do not   
   measure kernel security, sandboxing, exploit mitigations, patch velocity,   
   or code quality. They measure user exposure, not OS architecture.   
      
   No serious security expert claims "iOS is way more secure."   
      
   Security researchers consistently say the opposite: both platforms have   
   strengths and weaknesses. iOS has a strong sandbox and strong hardware   
   security, but slow patch cycles and opaque code quality. Android has a   
   larger attack surface and more malware, but faster patching for many   
   components and better transparency. Security is not a scoreboard. It is a   
   system.   
      
   The only meaningful way to compare security is by looking at real-world   
   exploited vulnerabilities, patch timelines, exploit mitigations, and code   
   quality. When you look at those metrics, the picture is mixed, not   
   one-sided.   
      
   So yes, you and I use different definitions of "security." You are using   
   malware statistics. I am using CISA KEV data, Project Zero research, patch   
   velocity, exploit mitigations, and code quality. Those are the metrics used   
   by actual security professionals.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca