The chain of trust in Apple’s devices

Kirk McElhearn for Intego:

A lot of computer security is based on trust. Your devices verify that you are, indeed, an authorized user, through the use of user names and passwords. And your devices trust services and servers, through a series of certificates and “trusted third parties” who work through a cascading system of verification and authentication.

If you use Apple devices, the company has its own chain of trust that allows you to use multiple devices in concert. Each link of this chain is carefully designed to ensure its reliability, and each link also enhances other links in the chain. This can seem complex, but when you break it down into its component parts, it’s a lot easier to understand.

In most cases, you don’t need to know how all these elements work together, but it can be good to be aware of how Apple ensures the security of your devices, your accounts, and even your payment methods.

MacDailyNews Take: A good overview of how your Apple devices work to create a web of trust.

1 Comment

  1. Unfortunately, most consumers aren’t interested in a web of trust. Most consumers are interested in saving money and are happy to put their trust in free Google Services and Facebook social media. I don’t think security is something that most consumers are concerned about. With Facebook, despite all the supposed fears of personal data breaches and the ongoing federal investigations, the company is getting bigger and wealthier by the day. That’s solid proof that security is not something most consumers are concerned about. Most Android devices don’t necessarily receive security updates and I doubt very few Android smartphone users are even aware of that shortcoming. If your Android smartphone is two years old, then don’t even consider getting any security updates. No matter, Android smartphone market share continues to grow while iPhone market share continues to shrink. That’s all Wall Street has to know.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.