Apple

report:-iphone-se-could-shed-its-10-year-old-design-“as-early-as-next-week”

Report: iPhone SE could shed its 10-year-old design “as early as next week”

Gurman suggests that Apple could raise the $429 starting price of the new iPhone SE to reflect the updated design. He also says that Apple’s supplies of the $599 iPhone 14 are running low at Apple’s stores—the 14 has already been discontinued in some countries over its lack of USB-C port, and it’s possible Apple could be planning to replace both the iPhone 14 and the old SE with the new SE.

Apple’s third-generation iPhone SE is nearly three years old, but its design (including its dimensions, screen size, Home button, and Lightning port) hearkens all the way back to 2014’s iPhone 6. Put 2017’s iPhone 8 and 2022’s iPhone SE on a table next to each other, and almost no one could tell the difference. These days, it feels like a thoroughly second-class iPhone experience, and a newer design is overdue.

Other Apple products allegedly due for an early 2025 release include the M4 MacBook Airs and a next-generation Apple TV, which, like the iPhone SE, was also last refreshed in 2022. Gurman has also said that a low-end iPad and a new iPad Air will arrive “during the first half of 2025” and updated Mac Pro and Mac Studio models are to arrive sometime this year as well. Apple is also said to be making progress on its own smart display, expanding its smart speaker efforts beyond the aging HomePod and HomePod mini.

Report: iPhone SE could shed its 10-year-old design “as early as next week” Read More »

uk-demands-apple-break-encryption-to-allow-gov’t-spying-worldwide,-reports-say

UK demands Apple break encryption to allow gov’t spying worldwide, reports say

The United Kingdom issued a secret order requiring Apple to create a backdoor for government security officials to access encrypted data, The Washington Post reported today, citing people familiar with the matter.

UK security officials “demanded that Apple create a backdoor allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud,” the report said. “The British government’s undisclosed order, issued last month, requires blanket capability to view fully encrypted material, not merely assistance in cracking a specific account, and has no known precedent in major democracies.”

Apple and many privacy advocates have repeatedly criticized government demands for backdoors to encrypted systems, saying they would harm security and privacy for all users. Backdoors developed for government use would inevitably be exploited by criminal hackers and other governments, security experts have said.

The UK is reportedly seeking access to data secured by end-to-end encryption with Apple’s Advanced Data Protection, which prevents even Apple from seeing user data. Advanced Data Protection is an optional setting that users can enable for iCloud backups, photos, notes, and other data.

“Rather than break the security promises it made to its users everywhere, Apple is likely to stop offering encrypted storage in the UK,” The Washington Post paraphrased its sources as saying. “Yet that concession would not fulfill the UK demand for backdoor access to the service in other countries, including the United States.”

Apple opposes UK snooping powers

The Technical Capability Notice was reportedly issued by the UK Home Office under the Investigatory Powers Act (IPA). The 2016 law is nicknamed the Snoopers’ Charter and forbids unauthorized disclosure of the existence or contents of a warrant issued under the act.

“Apple can appeal the UK capability notice to a secret technical panel, which would consider arguments about the expense of the requirement, and to a judge who would weigh whether the request was in proportion to the government’s needs. But the law does not permit Apple to delay complying during an appeal,” the Post wrote.

UK demands Apple break encryption to allow gov’t spying worldwide, reports say Read More »

deepseek-ios-app-sends-data-unencrypted-to-bytedance-controlled-servers

DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers


Apple’s defenses that protect data from being sent in the clear are globally disabled.

A little over two weeks ago, a largely unknown China-based company named DeepSeek stunned the AI world with the release of an open source AI chatbot that had simulated reasoning capabilities that were largely on par with those from market leader OpenAI. Within days, the DeepSeek AI assistant app climbed to the top of the iPhone App Store’s “Free Apps” category, overtaking ChatGPT.

On Thursday, mobile security company NowSecure reported that the app sends sensitive data over unencrypted channels, making the data readable to anyone who can monitor the traffic. More sophisticated attackers could also tamper with the data while it’s in transit. Apple strongly encourages iPhone and iPad developers to enforce encryption of data sent over the wire using ATS (App Transport Security). For unknown reasons, that protection is globally disabled in the app, NowSecure said.

Basic security protections MIA

What’s more, the data is sent to servers that are controlled by ByteDance, the Chinese company that owns TikTok. While some of that data is properly encrypted using transport layer security, once it’s decrypted on the ByteDance-controlled servers, it can be cross-referenced with user data collected elsewhere to identify specific users and potentially track queries and other usage.

More technically, the DeepSeek AI chatbot uses an open weights simulated reasoning model. Its performance is largely comparable with OpenAI’s o1 simulated reasoning (SR) model on several math and coding benchmarks. The feat, which largely took AI industry watchers by surprise, was all the more stunning because DeepSeek reported spending only a small fraction on it compared with the amount OpenAI spent.

A NowSecure audit of the app has found other behaviors that researchers found potentially concerning. For instance, the app uses a symmetric encryption scheme known as 3DES or triple DES. The scheme was deprecated by NIST following research in 2016 that showed it could be broken in practical attacks to decrypt web and VPN traffic. Another concern is that the symmetric keys, which are identical for every iOS user, are hardcoded into the app and stored on the device.

The app is “not equipped or willing to provide basic security protections of your data and identity,” NowSecure co-founder Andrew Hoog told Ars. “There are fundamental security practices that are not being observed, either intentionally or unintentionally. In the end, it puts your and your company’s data and identity at risk.”

Hoog said the audit is not yet complete, so there are many questions and details left unanswered or unclear. He said the findings were concerning enough that NowSecure wanted to disclose what is currently known without delay.

In a report, he wrote:

NowSecure recommends that organizations remove the DeepSeek iOS mobile app from their environment (managed and BYOD deployments) due to privacy and security risks, such as:

  1. Privacy issues due to insecure data transmission
  2. Vulnerability issues due to hardcoded keys
  3. Data sharing with third parties such as ByteDance
  4. Data analysis and storage in China

Hoog added that the DeepSeek app for Android is even less secure than its iOS counterpart and should also be removed.

Representatives for both DeepSeek and Apple didn’t respond to an email seeking comment.

Data sent entirely in the clear occurs during the initial registration of the app, including:

  • organization id
  • the version of the software development kit used to create the app
  • user OS version
  • language selected in the configuration

Apple strongly encourages developers to implement ATS to ensure the apps they submit don’t transmit any data insecurely over HTTP channels. For reasons that Apple hasn’t explained publicly, Hoog said, this protection isn’t mandatory. DeepSeek has yet to explain why ATS is globally disabled in the app or why it uses no encryption when sending this information over the wire.

This data, along with a mix of other encrypted information, is sent to DeepSeek over infrastructure provided by Volcengine a cloud platform developed by ByteDance. While the IP address the app connects to geo-locates to the US and is owned by US-based telecom Level 3 Communications, the DeepSeek privacy policy makes clear that the company “store[s] the data we collect in secure servers located in the People’s Republic of China.” The policy further states that DeepSeek:

may access, preserve, and share the information described in “What Information We Collect” with law enforcement agencies, public authorities, copyright holders, or other third parties if we have good faith belief that it is necessary to:

• comply with applicable law, legal process or government requests, as consistent with internationally recognised standards.

NowSecure still doesn’t know precisely the purpose of the app’s use of 3DES encryption functions. The fact that the key is hardcoded into the app, however, is a major security failure that’s been recognized for more than a decade when building encryption into software.

No good reason

NowSecure’s Thursday report adds to growing list of safety and privacy concerns that have already been reported by others.

One was the terms spelled out in the above-mentioned privacy policy. Another came last week in a report from researchers at Cisco and the University of Pennsylvania. It found that the DeepSeek R1, the simulated reasoning model, exhibited a 100 percent attack failure rate against 50 malicious prompts designed to generate toxic content.

A third concern is research from security firm Wiz that uncovered a publicly accessible, fully controllable database belonging to DeepSeek. It contained more than 1 million instances of “chat history, backend data, and sensitive information, including log streams, API secrets, and operational details,” Wiz reported. An open web interface also allowed for full database control and privilege escalation, with internal API endpoints and keys available through the interface and common URL parameters.

Thomas Reed, staff product manager for Mac endpoint detection and response at security firm Huntress, and an expert in iOS security, said he found NowSecure’s findings concerning.

“ATS being disabled is generally a bad idea,” he wrote in an online interview. “That essentially allows the app to communicate via insecure protocols, like HTTP. Apple does allow it, and I’m sure other apps probably do it, but they shouldn’t. There’s no good reason for this in this day and age.”

He added: “Even if they were to secure the communications, I’d still be extremely unwilling to send any remotely sensitive data that will end up on a server that the government of China could get access to.”

HD Moore, founder and CEO of runZero, said he was less concerned about ByteDance or other Chinese companies having access to data.

“The unencrypted HTTP endpoints are inexcusable,” he wrote. “You would expect the mobile app and their framework partners (ByteDance, Volcengine, etc) to hoover device data, just like anything else—but the HTTP endpoints expose data to anyone in the network path, not just the vendor and their partners.”

On Thursday, US lawmakers began pushing to immediately ban DeepSeek from all government devices, citing national security concerns that the Chinese Communist Party may have built a backdoor into the service to access Americans’ sensitive private data. If passed, DeepSeek could be banned within 60 days.

This story was updated to add further examples of security concerns regarding DeepSeek.

Photo of Dan Goodin

Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.

DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers Read More »

the-severance-writer-and-cast-on-corporate-cults,-sci-fi,-and-more

The Severance writer and cast on corporate cults, sci-fi, and more

The following story contains light spoilers for season one of Severence but none for season 2.

The first season of Severance walked the line between science-fiction thriller and Office Space-like satire, using a clever conceit (characters can’t remember what happens at work while at home, and vice versa) to open up new storytelling possibilities.

It hinted at additional depths, but it’s really season 2’s expanded worldbuilding that begins to uncover additional themes and ideas.

After watching the first six episodes of season two and speaking with the series’ showrunner and lead writer, Dan Erickson, as well as a couple of members of the cast (Adam Scott and Patricia Arquette), I see a show that’s about more than critiquing corporate life. It’s about all sorts of social mechanisms of control. It’s also a show with a tremendous sense of style and deep influences in science fiction.

Corporation or cult?

When I started watching season 2, I had just finished watching two documentaries about cults—The Vow, about a multi-level marketing and training company that turned out to be a sex cult, and Love Has Won: The Cult of Mother God, about a small, Internet-based religious movement that believed its founder was the latest human form of God.

There were hints of cult influences in the Lumon corporate structure in season 1, but without spoiling anything, season 2 goes much deeper into them. As someone who has worked at a couple of very large media corporations, I enjoyed Severance’s send-up of corporate culture. And as someone who has worked in tech startups—both good and dysfunctional ones—and who grew up in a radical religious environment, I now enjoy its send-up of cult social dynamics and power plays.

Employees watch a corporate propaganda video

Lumon controls what information is presented to its employees to keep them in line. Credit: Apple

When I spoke with showrunner Dan Erickson and actor Patricia Arquette, I wasn’t surprised to learn that it wasn’t just me—the influence of stories about cults on season 2 was intentional.

Erickson explained:

I watched all the cult documentaries that I could find, as did the other writers, as did Ben, as did the actors. What we found as we were developing it is that there’s this weird crossover. There’s this weird gray zone between a cult and a company, or any system of power, especially one where there is sort of a charismatic personality at the top of it like Kier Eagan. You see that in companies that have sort of a reverence for their founder.

Arquette also did some research on cults. “Very early on when I got the pilot, I was pretty fascinated at that time with a lot of cult documentaries—Wild Wild Country, and I don’t know if you could call it a cult, but watching things about Scientology, but also different military schools—all kinds of things like that with that kind of structure, even certain religions,” she recalled.

The Severance writer and cast on corporate cults, sci-fi, and more Read More »

in-apple’s-first-quarter-earnings,-the-mac-leads-the-way-in-sales-growth

In Apple’s first-quarter earnings, the Mac leads the way in sales growth

Apple fell slightly short of investor expectations when it reported its first-quarter earnings today. While sales were up 4 percent overall, the iPhone showed signs of weakness, and sales in the Chinese market slipped by just over 11 percent.

CEO Tim Cook told CNBC that the iPhone performed better in countries where Apple Intelligence was available, like the US—seemingly suggesting that the slip was partially because Chinese consumers do not see enough reason to buy new phones without Apple Intelligence. (He also said, “Half of the decline is due to a change in channel inventory.”) iPhone sales also slipped in China during this same quarter last year; this was the first full quarter during which the iPhone 16 was available.

In any case, Cook said the company plans to roll out Apple Intelligence in additional languages, including Mandarin, this spring.

Apple’s wearables category also declined slightly, but only by 2 percent.

Despite the trends that worried investors, Apple reported $36.33 billion in net revenue for the first quarter. That’s 7.1 percent more than last year’s Q1. This was driven by the Mac, the iPad, and Services (which includes everything from Apple Music to iCloud)—all of which saw slight upticks in sales. Services was up 14 percent, continuing a strong streak for that business, while the Mac and the iPad both jumped up 15 percent.

The uptick in Mac and iPad sales was likely helped by several new Mac models and a new iPad mini starting shipments last October.

Cook shared some other interesting numbers in the earnings call with investors and the press: The company has an active base of 2.35 billion devices, and it has more than 1 billion active subscriptions.

In Apple’s first-quarter earnings, the Mac leads the way in sales growth Read More »

apple-chips-can-be-hacked-to-leak-secrets-from-gmail,-icloud,-and-more

Apple chips can be hacked to leak secrets from Gmail, iCloud, and more


MEET FLOP AND ITS CLOSE RELATIVE, SLAP

Side channel gives unauthenticated remote attackers access they should never have.

Apple is introducing three M3 performance tiers at the same time. Credit: Apple

Apple-designed chips powering Macs, iPhones, and iPads contain two newly discovered vulnerabilities that leak credit card information, locations, and other sensitive data from the Chrome and Safari browsers as they visit sites such as iCloud Calendar, Google Maps, and Proton Mail.

The vulnerabilities, affecting the CPUs in later generations of Apple A- and M-series chip sets, open them to side channel attacks, a class of exploit that infers secrets by measuring manifestations such as timing, sound, and power consumption. Both side channels are the result of the chips’ use of speculative execution, a performance optimization that improves speed by predicting the control flow the CPUs should take and following that path, rather than the instruction order in the program.

A new direction

The Apple silicon affected takes speculative execution in new directions. Besides predicting control flow CPUs should take, it also predicts the data flow, such as which memory address to load from and what value will be returned from memory.

The most powerful of the two side-channel attacks is named FLOP. It exploits a form of speculative execution implemented in the chips’ load value predictor (LVP), which predicts the contents of memory when they’re not immediately available. By inducing the LVP to forward values from malformed data, an attacker can read memory contents that would normally be off-limits. The attack can be leveraged to steal a target’s location history from Google Maps, inbox content from Proton Mail, and events stored in iCloud Calendar.

SLAP, meanwhile, abuses the load address predictor (LAP). Whereas LVP predicts the values of memory content, LAP predicts the memory locations where instruction data can be accessed. SLAP forces the LAP to predict the wrong memory addresses. Specifically, the value at an older load instruction’s predicted address is forwarded to younger arbitrary instructions. When Safari has one tab open on a targeted website such as Gmail, and another open tab on an attacker site, the latter can access sensitive strings of JavaScript code of the former, making it possible to read email contents.

“There are hardware and software measures to ensure that two open webpages are isolated from each other, preventing one of them from (maliciously) reading the other’s contents,” the researchers wrote on an informational site describing the attacks and hosting the academic papers for each one. “SLAP and FLOP break these protections, allowing attacker pages to read sensitive login-protected data from target webpages. In our work, we show that this data ranges from location history to credit card information.”

There are two reasons FLOP is more powerful than SLAP. The first is that it can read any memory address in the browser process’s address space. Second, it works against both Safari and Chrome. SLAP, by contrast, is limited to reading strings belonging to another webpage that are allocated adjacently to the attacker’s own strings. Further, it works only against Safari. The following Apple devices are affected by one or both of the attacks:

• All Mac laptops from 2022–present (MacBook Air, MacBook Pro)

• All Mac desktops from 2023–present (Mac Mini, iMac, Mac Studio, Mac Pro)

• All iPad Pro, Air, and Mini models from September 2021–present (Pro 6th and 7th generation, Air 6th gen., Mini 6th gen.)

• All iPhones from September 2021–present (All 13, 14, 15, and 16 models, SE 3rd gen.)

Attacking LVP with FLOP

After reverse-engineering the LVP, which was introduced in the M3 and A17 generations, the researchers found that it behaved unexpectedly. When it sees the same data value being repeatedly returned from memory for the same load instruction, it will try to predict the load’s outcome the next time the instruction is executed, “even if the memory accessed by the load now contains a completely different value!” the researchers explained. “Therefore, using the LVP, we can trick the CPU into computing on incorrect data values.” They continued:

“If the LVP guesses wrong, the CPU can perform arbitrary computations on incorrect data under speculative execution. This can cause critical checks in program logic for memory safety to be bypassed, opening attack surfaces for leaking secrets stored in memory. We demonstrate the LVP’s dangers by orchestrating these attacks on both the Safari and Chrome web browsers in the form of arbitrary memory read primitives, recovering location history, calendar events, and credit card information.”

FLOP requires a target to be logged in to a site such as Gmail or iCloud in one tab and the attacker site in another for a duration of five to 10 minutes. When the target uses Safari, FLOP sends the browser “training data” in the form of JavaScript to determine the computations needed. With those computations in hand, the attacker can then run code reserved for one data structure on another data structure. The result is a means to read chosen 64-bit addresses.

When a target moves the mouse pointer anywhere on the attacker webpage, FLOP opens the URL of the target page address in the same space allocated for the attacker site. To ensure that the data from the target site contains specific secrets of value to the attacker, FLOP relies on behavior in Apple’s WebKit browser engine that expands its heap at certain addresses and aligns memory addresses of data structures to multiples of 16 bytes. Overall, this reduces the entropy enough to brute-force guess 16-bit search spaces.

Illustration of FLOP attack recovering data from Google Maps Timeline (Top), a Proton Mail inbox (Middle), and iCloud Calendar (Bottom). Credit: Kim et al.

When a target browses with Chrome, FLOP targets internal data structures the browser uses to call WebAssembly functions. These structures first must vet the signature of each function. FLOP abuses the LVP in a way that allows the attacker to run functions with the wrong argument—for instance, a memory pointer rather than an integer. The end result is a mechanism for reading chosen memory addresses.

To enforce site isolation, Chrome allows two or more webpages to share address space only if their extended top-level domain and the prefix before this extension (for instance, www.square.com) are identical. This restriction prevents one Chrome process from rendering URLs with attacker.square.com and target.square.com, or as attacker.org and target.org. Chrome further restricts roughly 15,000 domains included in the public suffix list from sharing address space.

To bypass these rules, FLOP must meet three conditions:

  1. It cannot target any domain specified in the list such that attacker.site.tld can share an address space with target.site.tld
  2. The webpage must allow users to host their own JavaScript and WebAssembly on the attacker.site.tld,
  3. The target.site.tld must render secrets

Here, the researchers show how such an attack can steal credit card information stored on a user-created Square storefront such as storename.square.site. The attackers host malicious code on their own account located at attacker.square.site. When both are open, attacker.square.site inserts malicious JavaScript and WebAssembly into it. The researchers explained:

“This allows the attacker storefront to be co-rendered in Chrome with other store-front domains by calling window.open with their URLs, as demonstrated by prior work. One such domain is the customer accounts page, which shows the target user’s saved credit card information and address if they are authenticated into the target storefront. As such, we recover the page’s data.”

Left: UI elements from Square’s customer account page for a storefront. Right: Recovered last four credit card number digits, expiration date, and billing address via FLOP-Control. Credit: Kim et al.

SLAPping LAP silly

SLAP abuses the LAP feature found in newer Apple silicon to perform a similar data-theft attack. By forcing LAP to predict the wrong memory address, SLAP can perform attacker-chosen computations on data stored in separate Safari processes. The researchers demonstrate how an unprivileged remote attacker can then recover secrets stored in Gmail, Amazon, and Reddit when the target is authenticated.

Top: Email subject and sender name shown as part of Gmail’s browser DOM. Bottom: Recovered strings from this page. Credit: Kim et al.

Top Left: A listing for coffee pods from Amazon’s ‘Buy Again’ page. Bottom Left: Recovered item name from Amazon. Top Right: A comment on a Reddit post. Bottom Right: the recovered text. Credit: Kim et al.

“The LAP can issue loads to addresses that have never been accessed architecturally and transiently forward the values to younger instructions in an unprecedentedly large window,” the researchers wrote. “We demonstrate that, despite their benefits to performance, LAPs open new attack surfaces that are exploitable in the real world by an adversary. That is, they allow broad out-of-bounds reads, disrupt control flow under speculation, disclose the ASLR slide, and even compromise the security of Safari.”

SLAP affects Apple CPUs starting with the M2/A15, which were the first to feature LAP. The researchers said that they suspect chips from other manufacturers also use LVP and LAP and may be vulnerable to similar attacks. They also said they don’t know if browsers such as Firefox are affected because they weren’t tested in the research.

An academic report for FLOP is scheduled to appear at the 2025 USENIX Security Symposium. The SLAP research will be presented at the 2025 IEEE Symposium on Security and Privacy. The researchers behind both papers are:

• Jason Kim, Georgia Institute of Technology

• Jalen Chuang, Georgia Institute of Technology

• Daniel Genkin, Georgia Institute of Technology

• Yuval Yarom, Ruhr University Bochum

The researchers published a list of mitigations they believe will address the vulnerabilities allowing both the FLOP and SLAP attacks. They said that Apple officials have indicated privately to them that they plan to release patches.

In an email, an Apple representative declined to say if any such plans exist. “We want to thank the researchers for their collaboration as this proof of concept advances our understanding of these types of threats,” the spokesperson wrote. “Based on our analysis, we do not believe this issue poses an immediate risk to our users.”

Photo of Dan Goodin

Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.

Apple chips can be hacked to leak secrets from Gmail, iCloud, and more Read More »

with-ios-18.3,-apple-intelligence-is-now-on-by-default

With iOS 18.3, Apple Intelligence is now on by default

As is custom, Apple rolled out software updates to all its platforms at once today. All users should now have access to the public releases of iOS 18.3, macOS Sequoia 15.3, watchOS 11.3, iPadOS 15.3, tvOS 15.3, and visionOS 2.3.

Also, as usual, the iOS update is the meatiest of the bunch. Most of the changes relate to Apple Intelligence, a suite of features built on deep learning models. The first Apple Intelligence features were introduced in iOS 18, with additional ones added in iOS 18.1 and iOS 18.2

iOS 18.3 doesn’t add any significant new features to Apple Intelligence—instead, it tweaks what’s already there. Whereas Apple Intelligence was opt-in in previous OS versions, it is now on by default in iOS 18.3 on supported devices.

For the most part, that shouldn’t be a noticeable change for the majority of users, except for one thing: notification summaries. As we’ve reported, the feature that summarizes large batches of notifications using a large language model is hit-and-miss at best.

For most apps, not much has changed on that front, but Apple announced that with iOS 18.3, it’s temporarily disabling notification summaries for apps from the “News & Entertainment” category in light of criticisms by the BBC and others about how the feature was getting the substance of headlines wrong. The feature will still mess up summarizing your text messages and emails, though.

Apple says it has changed the presentation of summaries to make it clearer that they are distinct from other, non-AI generated summaries and that they are in beta and may be inaccurate.

Other updates include one to visual intelligence, a feature available on the most recent phones that gives you information on objects your camera is focused on. It can now identify more plants and animals, and you can create calendar events from flyers or posters seen in your viewfinder.

With iOS 18.3, Apple Intelligence is now on by default Read More »

uk-opens-probe-into-google’s-and-apple’s-mobile-platforms

UK opens probe into Google’s and Apple’s mobile platforms

Last week, the CMA opened its first such case, reviewing Google’s dominance in search and advertising.

The CMA is already in the process of probing Google and Apple in a separate investigation into mobile web browsers and cloud gaming, which has provisionally found the two companies were “holding back competition” in browsers.

“Android’s openness has helped to expand choice, reduce prices, and democratize access to smartphones and apps. It’s the only example of a successful and viable open source mobile operating system,” said Oliver Bethell, Google’s senior director of competition.

“We favor a way forward that avoids stifling choice and opportunities for UK consumers and businesses alike, and without risk to UK growth prospects,” he added.

Apple, which says its app platform supports hundreds of thousands of UK jobs, said it would “continue to engage constructively” with the CMA.

“Apple believes in thriving and dynamic markets where innovation can flourish,” the company said. “We face competition in every segment and jurisdiction where we operate, and our focus is always the trust of our users.”

The CMA’s probe will add to the worldwide scrutiny that both companies are already facing over their dominance of the smartphone market.

Apple clashed with Brussels several times last year over the implementation of the Digital Markets Act, making changes to its platform after the European Commission accused the iPhone maker of failing to comply with its “online gatekeeper” rules.

If designated, the UK’s “strategic market status” lasts for a five-year period, and companies can be fined up to 10 percent of global turnover for breaching conduct rules.

© 2025 The Financial Times Ltd. All rights reserved. Not to be redistributed, copied, or modified in any way.

UK opens probe into Google’s and Apple’s mobile platforms Read More »

apple-must-face-suit-over-alleged-policy-of-underpaying-female-workers

Apple must face suit over alleged policy of underpaying female workers

While some of Apple’s defense was deemed “demonstrably inaccurate” and most of its arguments “insufficient,” Apple did successfully argue against efforts to seize back pay for former female employees no longer working for Apple who were seemingly also impacted by allegedly sexist policies implemented in 2020. That claim must be dropped as the proposed class action moves forward.

Additionally, another claim alleging pay disparity that was linked to racial discrimination was suspended. But the Apple worker suing, Zainab Bori, will have a chance to amend her claim that she was fired as retaliation for filing a discrimination complaint. It could survive if she adds currently missing evidence that “she suffered an adverse employment action” while working under a manager with an alleged “history of negative interactions with African American employees,” Schulman’s order said.

Apple did not immediately respond to Ars’ request for comment.

In a press release sent to Ars, Eve Cervantez, a lawyer representing Apple workers suing, celebrated the court’s ruling.

“I am really pleased with today’s ruling,” Cervantez said. “This start low, stay low practice has been a no-win situation for women working at Apple for years. So, I’m glad they will have their day in court.”

Apple accused of ignoring hostile work environment

For Justina Jong—whom the complaint noted joined Apple in 2013 and has helped lead “cross-functional teams that improve the App Review experience for global app developers”—this week’s win might be particularly encouraging after Apple allegedly refused to take her experience with sexual harassment seriously.

Jong has alleged that in 2019, Blaine Weilert, a senior member of an Apple talent development team, touched her in a sexually suggestive manner without consent. Although Weilert admitted to the act and was disciplined, Apple tried and failed to argue this was a one-time offense that didn’t constitute a hostile work environment or warrant Jong’s repeated requests to be moved away from Weilert in Apple’s offices.

Apple must face suit over alleged policy of underpaying female workers Read More »

apple-intelligence,-previously-opt-in-by-default,-enabled-automatically-in-ios-18.3

Apple Intelligence, previously opt-in by default, enabled automatically in iOS 18.3

Apple has sent out release candidate builds of the upcoming iOS 18.3, iPadOS 18.3, and macOS 15.3 updates to developers today. But they come with one tweak that hasn’t been reported on, per MacRumors: They enable all of the AI-powered Apple Intelligence features by default during setup. When Apple Intelligence was initially released in iOS 18.1, the features were off by default, unless users chose to opt-in and enable them.

Those who still wish to opt out of Apple Intelligence features will now have to do it after their devices are set up by navigating to the Apple Intelligence & Siri section in the Settings app.

Apple Intelligence will only be enabled by default for hardware that supports it. For the iPhone, that’s just the iPhone 15 Pro series, iPhone 16 series, and iPhone 16 Pro series. It goes further back on the iPad and Mac—Apple Intelligence works on any model with an M1 processor or newer.

Apple is following in the footsteps of Microsoft and Google here, rolling out new generative AI features to its user base as quickly as possible and enabling some or all of them by default while still labeling everything as a “beta” and pointing to that label when things go wrong. Case in point: The iOS 18.3 update also temporarily disables all notification summaries for apps in the App Store’s “news and entertainment” category, because some of those summaries contained major factual inaccuracies.

Apple Intelligence, previously opt-in by default, enabled automatically in iOS 18.3 Read More »

report:-apple-mail-is-getting-automatic-categories-on-ipados-and-macos

Report: Apple Mail is getting automatic categories on iPadOS and macOS

Unlike numerous other new and recent OS-level features from Apple, mail sorting does not require a device capable of supporting its Apple Intelligence (generally M-series Macs or iPads), and happens entirely on the device. It’s an optional feature and available only for English-language emails.

Apple released a third beta of MacOS 15.3 just days ago, indicating that early, developer-oriented builds of macOS 15.4 with the sorting feature should be weeks away. While Gurman’s newsletter suggests mail sorting will also arrive in the Mail app for iPadOS, he did not specify which version, though the timing would suggest the roughly simultaneous release of iPadOS 18.4.

Also slated to arrive in the same update for Apple-Intelligence-ready devices is the version of Siri that understands more context about questions, from what’s on your screen and in your apps. “Add this address to Rick’s contact information,” “When is my mom’s flight landing,” and “What time do I have dinner with her” are the sorts of examples Apple highlighted in its June unveiling of iOS 18.

Since then, Apple has divvied up certain aspects of Intelligence into different OS point updates. General ChatGPT access and image generation have arrived in iOS 18.2 (and related Mac and iPad updates), while notification summaries, which can be pretty rough, are being rethought and better labeled and will be removed from certain news notifications in iOS 18.3.

Report: Apple Mail is getting automatic categories on iPadOS and macOS Read More »

ios-18.3-beta-disables-news-notification-summaries-after-high-stakes-errors

iOS 18.3 beta disables news notification summaries after high-stakes errors

In our own extensive testing with Apple Intelligence notification summaries in iOS 18.1 and macOS 15.1, we observed many instances of summaries that were inaccurate or just plain weird. When you’re just getting updates from your Discords or group text threads, errors tend to be pretty low-stakes, at least. But when you’re getting notifications about war, murder, and politics, these kinds of errors have the potential to mislead and misinform.

The iOS 18.1 and 18.2 updates (along with iPadOS 18.2 and macOS Sequoia 15.2) enabled most of Apple’s promised Intelligence features across all the hardware that supports them. For the iPhone, that’s still only 2023’s iPhone 15 Pro and 2024’s iPhone 16 and iPhone 16 Pro.

The iOS 18.3 update is currently in its third beta release. The iOS 17.3, 16.3, and 15.3 updates have all been released in late January, so it’s likely that we’ll see the 18.3 update (and corresponding updates for iPadOS, macOS, and other Apple software) released at some point in the next few weeks.

iOS 18.3 beta disables news notification summaries after high-stakes errors Read More »