Apple Privacy and Security Myths
Dispelling the Lies of the World's Largest Tech Company


Shawn Stewart
Mr. Stewart has 27 years of experience with hundreds of international, commercial, military, and government IT projects. He holds certifications with ISC2, Cisco, Microsoft, CompTIA, ITIL, Novell, and others. He has a Masters in Cybersecurity, a Bachelors in IT, a Minor in Professional Writing, and is a published author.
The Bright Red Apple
Apple users beware! Remember The Masque of the Red Death by Edgar Allen Poe? Here are the highlights. Prince Prospero used his wealth to hide the nobles of his land inside his stronghold while the rest of the countryside succumbed to a deadly plague. Even though they literally welded the doors shut, somehow the plague got in and ravaged those who thought they were safe.
This is a cautionary tale for all you Apple users out there who keep telling me you don’t need to discuss cybersecurity. “Mac isn’t susceptible to the malware, viruses, and hacks that Windows or Linux suffers from,” quotes one misinformed soul. “Apple has gone above and beyond to protect our privacy, unlike Android devices,” quotes another oblivious user. Do you believe because you stood in a long line and paid more for your products, you are somehow protected? Allow me to be your specter in the velvet black room.
Not Just Sour Apples
Your Mac is no longer a proprietary collection of hardware and software components that hackers aren’t able to write code for. In fact, since 2006, you have been running the same computing hardware as everyone else, Intel-based processors. Sure, your power cable uses magnetic induction and you have yellow cases, but it’s the same base hardware as everyone else.
“But what about the software? Surely the software is different.” Wrong. Macs are built using Linux, specifically BSD. At one time, yes, it was independent, but, again, Apple had to follow suit with everyone else. In fact, a hacker can run any C++ or Bash program on your Mac same as pretty much any other computer. Oh, and most Macs can run Windows PowerShell natively, which is the favorite among Windows hackers. With all the convenience of file sharing, a hacker doesn’t even need to break into your computer to see all your files. Yes, even without your password.
Talking Fruit
You see, every network device still communicates using the standard Internet Protocol (IP). It’s not proprietary AppleTalk anymore. When you are connected to a coffee shop or open Wi-Fi, you are not protected any better than any other device. Learn how the Internet works here (Link). Apple lied to you about masking your real addresses to keep you safe on Wi-Fi (Link). They also lied to you about the levels of protection they have natively built into their software (Link).
An Apple in the Hand
“But the iPhone is safe, right?” Wrong. Again, the iPhone hardware uses the same base processor and infrastructure as everyone else. Plus, the same problems apply. If I can get access, whether physically or through the network, I’m still in. I can still fool you into logging into a fake free Wi-Fi in the real world and capture all your data (Link).
Apple Store has the same problems Google Play Store has with fake applications installed by nation states and threat actors that are really just data collection, malware, and data miners. Don’t think Apple struggles? (Link) And I’m not just talking about TikTok. You really shouldn’t have the TikTok app on your phone. (Link)
Private Apples
“But Apple protects my privacy better than any other company.” Oh, are you talking about that one time they refused to back-door the iPhone for the FBI? You know the FBI hackers bypassed security through a known vulnerability, right? (Link) That was the ONLY time they did that. Apple has one of the highest rates of compliance with Federal and law enforcement requests for information, many times WITHOUT A WARRANT (Link)! They really don’t believe in your privacy.
Worse still is even if Apple didn’t cooperate, the phone carriers (AT&T, Verizon, T-Mobile) all have backdoors into your iPhones. Plus, they have all the records of everything you’ve ever done on your phone. Oh, and they are actively listening to your conversations…and you agreed to let them do it (Link)! Learn to stop robocalls and spammers here (Link).
Protecting Your Apple Assets
Now that you realize Apple isn’t your friend or the holier-than-the-rest-of-Silicon-Valley company like you thought they were, how do you protect yourself? First, start by finding a well-respected third-party endpoint protection software, such as BitDefender, McAfee, or Symantec. Install it on all of your phones and computers. Then get a well-respected third-party password manager for all the same devices. You will thank me later. DO NOT use a free version! Only paid versions are maintained, automatically updated, and can stay ahead of global threats in real time.
You do NOT need a VPN! Read about VPNs here (Link).
Next, follow the guides to maximize your privacy on your Apple products. Here is one for iPhone (Link) and one Mac (Link). Turn on automatic updates but periodically force manual updates. There are some updates that require reboots that will not run automatically. Then back up all your data either using an Apple product or verified third-party software. Offline backups will ensure if you are hit with Ransomware, you have an untouched backup.
Seeds of Change
Finally, change your thinking. You’ve been living in this false world of security for years now and you may already have a malicious program stealing your passwords. The Endpoint Protection Software should find any anomalies. Follow the same rules the rest of us have been following for years. Don’t open email from people you don’t know. Don’t click on any unverified or suspicious links just to “see where they go” and don’t browse around unsavory places on the Internet or follow ClickBait. Read about privacy for everyone here (Link).
Let’s face it. There was a time when Apple meant not following the mainstream. Having a Mac used to be thumbing your nose at corporate America. And, yes, Macs are still better at video processing than Windows, hands down. But Apple is now THE LARGEST technology company in the WORLD by revenue! Bigger than Microsoft, Meta, and Dell COMBINED! They are bigger than Google (Alphabet) by over $100 Billion in revenue. They are now the monster and they act like it.
Beneath the Peel
Don’t believe me. It’s fine. But you should believe Mitre. The Mitre database is an open collection of all the hardware and software bugs, exploits, and vulnerabilities in every commercially available product. Click here (Link) and search for Apple. Be specific. Search for “iPhone 15”. Sorry, Apple isn’t magic. They are a collection of human programmers making mistakes just like the rest of us.
I hate to be the bearer of bad news, but times have changed. Maybe we are all iSheep to our different brand flocks (Link) but Apple users are more vulnerable than everyone else because you’ve been lied to. You’ve been told you don’t need protection. You’ve been told you don’t need to fear spam and phishing. You’ve been told Apple products are immune to viruses, malware, and Ransomware. Maybe you should consider that Apple isn’t a fresh, flawless pick anymore and protect yourselves from the real rotten apples of the world.
Need Help?
Reach out to us! We’re all in this together. Visit our contact page to submit an inquiry. Also, please follow us on social media for the latest updates.
Check Out Our Podcast!
The Hillbilly Hacker Podcast is the hottest new show on the Internet to learn about today’s latest technology in simple words. You can find the Hillbilly Hacker on Spotify, Apple, Amazon, or where ever you find your podcasts. (Link)