That is the thing that make me keep away from using GrapheneOS or recommending to others.
In terms of security
- Can’t expect a few people to keep up to date with Google within the same exact time.
- Can’t trust them to implement features properly as it is not a one-to-one copy of android (android isn’t known to be modular. however, I have not a android dev)
- Android is forked, in order to distribute it. This might introduces their own security vulnerabilities.
As I didn’t provide any reasons for recommending iOS for @Throwaway post.
iOS offer 7+ years of security updates and 5+ years of OS updates (let see how long they support iPhone 8) and also known to release zero-day patches breaking their update policy to older devices.
This is on top of defences in many layers of its core OS which includes but is not limited to:
XProtect
Yara (so you can even add your own rules)
Gatekeeper
System Integrity Protection (SIP)
Malware Removal Tool (MRT)
Core Suggestions
Incompatible Kernel Extensions (KEXT Exclusions)
Application Firewall (cannot be disabled)
pf Firewall (BSD firewall, optional)
FileVault (high grade encryption of all your data)
Core LSKD (kdrl)
Flask Security Architecture for flexible mandatory access control
File quarantine
Deactivation of TPM (where applicable) on a hardware level
eficheck
Protection against “Juice Jacking”
Passwords are hashed then the hash is stored in an inaccessible hardware encryption chip (T2 and Secure Enclave chip onwards)
Cryptographic Boot
Secure Enclave (T2, etc.) chip
Is isolated so even if a host device is compromised the Secure Enclave remains secure
Provides hardware control of camera
FIPS 140-2/-3 Conformance Validation Certificate
2018 onwards FIPS 140-2 Security Level 1
2019 onwards FIPS 140-2 Security Level 2
FIPS 140-2/-3 Security Level 3 in newer products
Access control settings permissions for functions like Screen Recording, accessing Files and Folders, Input Monitoring, and Speech Recognition.
Address space layout randomization (ASLR)
Device management built into Intel CPUs is blocked and is completely inoperative
Ability to deactivate hostile apps worldwide, immediately
Apple A12 Bionic and onwards corrects an unexploited hardware exploit in earlier Secure Enclave chips
Sign in with Apple
Generalized location in Maps App
Private translate App
Recording Indicators for Mic and Camera
Limited Photos Library Access for Selected App
Apps forced to Request to Track
Enable WiFi Private Address
Enable Local Network Privacy Access
Write XOR execute (W^X)
Kernel Integrity Protection
Pointer authentication
Device isolation
Apple publishes lots of details about how their security designs are implemented. They are pretty open about it, and their designs are well-thought-out and implemented comprehensively:
This in on top of the security provides by apple kernal/
All the apple’s OSes are based on XNU kernel (which is open-source) allowing apple to share security features across OSes.
XNU is a hybrid kernel, containing features of both monolithic kernels and microkernels, attempting to make the best use of both technologies, such as the message passing ability of microkernels enabling greater modularity and larger portions of the OS to benefit from memory protection, and retaining the speed of monolithic kernels for some critical tasks.
This is on top of E2EE encryption iCloud(if you choose to use iCloud). This includes 23 services.
iCloud Backup (including device and Messages backup), iCloud Drive: Includes Pages, Keynote and Numbers documents, PDFs, Safari downloads or any other files manually or automatically saved to iCloud Drive, Photos, Notes, Reminders, Safari Bookmarks, Siri Shortcuts, Voice Memos, Wallet passes, Passwords and Keychain, Health data, Home data, Messages in iCloud, Payment information, Apple Card transactions, Maps: Includes Favourites, My Guides and Search History, QuickType Keyboard learned vocabulary, Safari: Includes History, Tab Groups and iCloud Tabs, Screen Time, Siri information: Includes Siri Settings and personalisation and, if you’ve set up Hey Siri, a sample of your requests, Wi-Fi passwords, W1 and H1 Bluetooth keys, Memoji
Unlike other tech companies, apples is built on a privacy first model.
Many things are intentionally not encrypted by default so that Google can harvest your information. They do this in the name of providing better service, but Apple has shown that this can be accomplished with on device AI and still provide proper privacy.
I am pretty sure Android barely fills a 6th of that.
etc, etc…
Also, many if not all the stuff I listed aren’t considered by most of the people who buy a iPhone
.