Control Device Data Integrity
Apple builds in a huge array of tools that help if your device is physically compromised, as when someone gains access to your iPhone or computer without your permission, someone takes your device away without your knowledge or steals it in order to try to break into it, or when someone extracts hardware (like a drive) from your Mac.
Apple created the chip-based Secure Enclave technology for iPhones and iPads, then expanded it for Macs starting with Intel models. It’s integral part of M-series Macs. Secure Enclave was a big improvement for device security and data integrity.
But Apple has layered much more underneath and around it. In this chapter, I start by explaining how the Secure Enclave works, and then proceed ...
Get Take Control of Securing Your Apple Devices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.