Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore Apple's Lockdown Mode security feature through detailed reverse engineering analysis in this 25-minute conference talk. Discover how zero-click attacks can compromise devices through seemingly innocent iMessages, calendar invites, or smart home functionality, and learn why Apple developed Lockdown Mode in 2022 to protect high-risk individuals like journalists, politicians, and activists. Examine the technical implementation of Lockdown Mode on macOS through static and dynamic reverse engineering techniques, including LLDB scripts, to understand which applications, daemons, and system services receive protection and which attack vectors the feature aims to mitigate. Gain insights into the security mechanisms that restrict and deactivate certain functions to defend against sophisticated attacks targeting individuals with valuable digital communications.