In fact, Amnesty International researchers say they had a really easy time finding and investigating compromise indicators for Apple Pull devices targeted with PePa Gasus Malware than those running stock Android.

“In Amnesty International’s experience, investigators on Apple iOS devices have significantly more forensic markers available than stock Android devices, so our method is focused on the former,” the group wrote in a lengthy technical analysis of its findings on gas gas. As a result, iPhones are among the most recent cases of confirmed gas infection. “

Some of the focus on Apple Pal is also from the company’s own emphasis on privacy and security in the design and marketing of its products.

“Apple is trying Paul, but the problem is that their reputation suggests they’re not working as hard,” says Matthew Green, a cryptographer at Johns Hopkins University.

Despite its more open approach, Google faces similar criticisms about how researchers can access its mobile operating operating system.

“Android and iOS have different types of lugs. “It’s really hard to compare,” says Zuck Avarham, CEO of analytics group Zackops and a longtime advocate of mobile system information. “Everyone has an advantage, but both are not equally sufficient and are able to hide threatening actors.”

However, both Apple Pal and Google are reluctant to say more about digital forensic sausage-making. And while most independent security researchers advocate this shift, some acknowledge that increasing the increased access to system telemetry will also help bad actors.

“While we understand that continuous logging will be more helpful for forensic use as described by Amnesty International researchers, it will also be helpful for attackers,” a Google spokesperson said in a statement to Wired.

Evan Christie, head of ApplePul Security Engineering and Architecture, said in a statement: “ApplePal condemns cyberspace rats against journalists, human rights activists and others who want to make the world a better place. For more than a decade, And as a result, security researchers agree that the iPhone is the safest and most secure consumer mobile device on the market. While that means they’re not a threat to the vast majority of our users, we continue to work tirelessly to protect all of our customers, and we’re constantly adding new security to their devices and data. “

The trick is to strike the right balance between giving more system indicators without making the jobs of inadvertent attackers easier. “While Apple can very safely allow monitoring and imaging of iOS devices to detect this type of misconduct, it is not considered a priority,” says the iOS security researcher. Will Straffach. “I’m sure they have policy reasons for this, but it’s something I don’t agree with and would love to see a change in this thinking.”

Thomas Reed, director of Mac and mobile platforms at antivirus maker MalwareBytes, says he agrees that more understanding of iOS will benefit user protection. But he adds that allowing special, reliable monitoring software will come with real risks. It points out that there are already suspicious and potentially unwanted programs on the OS Cause that antivirus cannot completely remove because the operating system supports them with this particular type of system trust, potentially in error. A similar problem with rogue system analysis tools will almost certainly cut into iOS as well.