Today, Apple has stopped signing all iPhones for iOS 15.2 authentication. This means that once users upgrade their phones to the latest iOS 15.2.1 version, they will no longer be able to downgrade to 15.2 or earlier. This isn't the first time Apple has imposed a new system on iPhone users. Earlier today, there were reports that Apple will completely stop updating iOS 14 and push iOS 15. Apple defends this decision, claiming that allowing users to stay in iOS 14 was only temporary. Whether Apple stops updating iOS 14 or closes the iOS 15.2 authentication channel, the goal is to get users to upgrade to the new system. Based on recent data, iOS 15's upgrade rate is worse than iOS 13 and iOS 14. Within four years, iOS 15's share is 57%. By contrast, iOS 14's four-year share of installs is 81%. For iOS 13, the install rate was 77%. We can see that iOS 15 actually performs worse than iOS 13 and iOS 14 in terms of installation. The slower upgrade speed is largely due to bugs in iOS 15, such as auto-brightness failure, unstable battery life, etc. These issues make many users who don't like the new system. want to experience. In the latest iOS 15.2.1 system, there has been feedback from users indicating that there is a bug in the system. The number keys, delete keys, and other keys on the keyboard are not displayed correctly. The operation crashes after the upgrade and this causes many users not to want to upgrade. iOS 15.2 devices are vulnerable to HomeKit Doorlock issue A new potential issue has surfaced affecting Apple HomeKit, directly affecting iOS 14.7 through the newer iOS 15.2. The problem is an ongoing denial of service vulnerability nicknamed "doorLock". The problem was found on Apple HomeKit, for those who don't know, a software framework that allows iPhone and iPad users to control smart home appliances right from their handset. Security researcher Trevor Spiniolas has made the details of this vulnerability public. According to him, Apple has been aware of the flaw since August 10, 2021. So far, nearly five months have passed and the company has not addressed the issue. According to the researcher, despite repeated promises to fix it, it remains unsolved. To activate 'doorLock', an attacker would change the name of a HomeKit device to a string of more than 500,000 characters. Spinolas has released a proof-of-concept exploit in the form of an iOS app. It can access Home data and change HomeKit device names even if the target user has not added Home devices to HomeKit.
HomeKit.Blog is in no way affiliated with or endorsed by Apple Inc. or Apple related subsidiaries.
All images, videos and logos are the copyright of the respective rights holders, and this website does not claim ownership or copyright of the aforementioned.
All information about products mentioned on this site has been collected in good faith. However, the information relating to them, may not be 100% accurate, as we only rely on the information we are able to gather from the companies themselves or the resellers who stock these products, and therefore cannot be held responsible for any inaccuracies arising from the aforementioned sources, or any subsequent changes that are made that we have not been made aware of.
HomeKit.Blog Is A Participant In The Amazon Services LLC Associates Program, An Affiliate Advertising Program Designed To Provide A Means For Sites To Earn Advertising Fees By Advertising And Linking To Amazon Store (Amazon.com, Or Endless.com, MYHABIT.com, SmallParts.com, Or AmazonWireless.com).
The opinions expressed on this website by our contributors do not necessarily represent the views of the website owners.