Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Pope Leo XIV names AI one of the reasons for his papal name

    May 10, 2025

    Whoop backpedals on its paid upgrade whoops

    May 10, 2025

    Green Chef Has the Tastiest Gluten-Free Recipes I’ve Made From a Meal Kit

    May 10, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » What It’s Like to Use Apple’s Lockdown Mode
    Security

    What It’s Like to Use Apple’s Lockdown Mode

    News RoomBy News RoomJanuary 6, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    With the releases of iOS 16 and macOS Ventura in 2022, Apple debuted its Lockdown Mode for people at particular risk of being targeted by mercenary spyware. The feature is essentially a set of configurations for iOS and macOS that limit or block niceties like link previews in Messages and shared albums in Photos. Lockdown Mode also restricts your device’s ability to accept unsolicited communications like FaceTime calls from phone numbers and accounts you’ve never called before. And this year, in iOS 17, Apple added additional improvements, meaning more safety-focused limitations. The company has consistently emphasized that Lockdown Mode is not meant for mainstream use by most people—but in a week of testing, it’s surprisingly tolerable.

    Turning on Lockdown Mode simply involves confirming the setting change with your device PIN or a biometric authentication in “Privacy & Security” and then rebooting so the system can apply all the restrictions and limitations. Enabling Lockdown Mode is similar to changing the language of your device—the system needs to comprehensively adopt the new configuration and apply it everywhere. Once the reboot is complete, your device comes back on looking pretty much like normal.

    When malware developers target Apple devices, they tailor their attacks to exploit weaknesses in the complex features of iOS and macOS that facilitate communication and data sharing and handle different file types and information formats. So Lockdown Mode aims to make it much harder for commercial spyware vendors or other motivated and well-resourced actors to develop exploit chains that combine vulnerabilities in multiple iOS or macOS features to take control of devices. In practice, this means that it’s harder and less fun to casually share—and especially receive—links, GIFs, and integrated elements in tools like Messages. And services like HomeKit are curtailed as well.

    For example, you can still use Apple Pay with Lockdown Mode, but its integrations with other apps are much less fluid. If someone sends you a payment through Apple Cash, you can receive it, but you’ll only get a very general, unspecific message in Messages that something has occurred— you won’t know that someone sent you money on Apple Cash. Links don’t expand when you send and receive them, and if you send or receive a link to an image or other file, it will send as text-only—a gnarly, full URL with no preview and no hyperlink that would let you automatically open it in a browser.

    As part of Apple’s most recent updates for Lockdown Mode in June, the company added support for Apple Watch and began automatically removing geolocation data from photos when you share them. The improvements also include a move to block devices by default from joining unsecured Wi-Fi networks and 2G cellular networks—a change meant to protect against malicious Wi-Fi networks and the mobile data surveillance tool known as stingrays.

    This set of updates enabled “safer wireless connectivity defaults, media handling, media sharing defaults, sandboxing, and network security optimizations,” Apple said in a statement at the time. “Turning on Lockdown Mode further hardens device defenses and strictly limits certain functionalities, sharply reducing the attack surface for those who need additional protections.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe Best Mechanical Keyboards for Work and Play
    Next Article Jackery’s rooftop tent is also a powerful solar generator

    Related Posts

    Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage

    May 10, 2025

    The Signal Clone Mike Waltz Was Caught Using Has Direct Access to User Chats

    May 8, 2025

    Tulsi Gabbard Reused the Same Weak Password on Multiple Accounts for Years

    May 7, 2025

    Signal Clone Used by Mike Waltz Pauses Service After Reports It Got Hacked

    May 6, 2025

    Security Researchers Warn a Widely Used Open Source Tool Poses a ‘Persistent’ Risk to the US

    May 6, 2025

    Hacking Spree Hits UK Retail Giants

    May 6, 2025
    Our Picks

    Whoop backpedals on its paid upgrade whoops

    May 10, 2025

    Green Chef Has the Tastiest Gluten-Free Recipes I’ve Made From a Meal Kit

    May 10, 2025

    SoundCloud says it isn’t using your music to train generative AI tools

    May 10, 2025

    Amazon’s ad-free Kindle Paperwhite Kids has hit its best price to date

    May 10, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gear

    How to Use Your iPad as a Second Monitor With Your Mac

    By News RoomMay 10, 2025

    Mirroring duplicates what’s on your iPad to your Mac. You’ll see the same content on…

    How to turn on Lockdown Mode for your iPhone and Mac

    May 10, 2025

    Samsung Galaxy S25 Edge Reveal Confirmed and Lenovo Launches a New 3D Laptop—Your Gear News of the Week

    May 10, 2025

    The Dangerous Decline in Vaccination Rates

    May 10, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.