Apple’s big condition to eliminate targeted vulnerabilities of the iPhone
Apple set up The new Slate of Aphons has been uploaded on Tuesday with the company’s new A19 and A19 Pro chips. Along with an iPhone Elith iPhone and other redesign, new phones are accompanied by a newer flashing version that can be a real killer feature. A security progress called memory integration, protecting the chip level always strives for the most difficult iPhone vulnerabilities against the most common and most commonly-and usually abusing it.
In recent years, a movement has been steadily growing throughout the global technology industry to address a kind of epidemic of deficiencies known as safety vulnerabilities in memory. Computer memory is a common source among all applications and when the software can eliminate data that must be removed from computer memory or data that should not be available for the program. When developers-even experienced and aware of the security-software software in programming languages, such as C and C ++, can be easily made mistakes that lead to memory safety vulnerabilities. For this reason, preventive tools such as special programming languages aim to make it impossible for software to be impossible for software, it makes it impossible to prevent them from introducing or getting them all.
The US National Security Agency and the Cyber Security and Infrastructure Agency wrote in a report in June: “The importance of memory safety cannot be over -used.” “The consequences of memory vulnerability in memory can be severe, from data violations to system accidents and operating disorders.”
Apple’s Swift programming language, released in 2014, is safe from memory. The company says it has been writing a new code in Swift for many years, as well as trying to revise the strategic and rewritten code in safe memory to make its systems safer. This reflects the challenge of memory safety throughout the industry, because even if the new code is more confidently written, the world software has been written in memory and memory for decades. And while, in general, Apple’s locked ecosystem has so far prevented widespread attacks against iPhones, motivated attackers, especially espionage makers, still develop complex iOS chains at high cost targeting iPhones.
Even with Apple’s work to start its codes for memory safety, the company found that these rare attack chains are almost always involved in the use of memory bugs.
“A well -known mercenary spy chains used against iOS share a common denominator with those who target Windows and Android: they use memory safety vulnerabilities, which are replaceable, powerful, and powerful,” Apple wrote in a statement on Wednesday.
Apple has increasingly invested in memory safety with fast and secure memory allocation, which is “dedicated” and “dealocated” memory areas, which is a major factor and a source of memory safety vulnerability. But the implementation of memory integrity was initially inspired by hardware work to protect the integrity of the code, even if a system had a memory corruption.