austin0000 wrote:
Thank you that’s interesting information to know. I forgot to mention this issue is recent.. And without straying away from the topic too much, you say logs are useful when an exploit has been identified, but aside from the typical and conventional surface level indicators that an exploit is being used - wouldn’t the logs be the next step up to identifying said exploit?
Searching voluminous and never-ending streams of text data looking for an unknown match for a problem which may not or does not exist is not often a fruitful endeavor.
That’s what log files are.
Once you know there is an issue and once you have targets to search for, then logs might get interesting.
Otherwise, you’re evaluating all of the passing cars on a freeway, looking for a crook. Without knowing the car. Which car contains a crook? Which car containing a crook is your crook?
Crooks also prefer to avoid logging messages. Calling attention to themselves tends to be considered undesirable.
Endpoint security might be useful, but that’s not something thpically all that useful for end-users.
Exploits against currently-patched iPhones are expensive, rare, and targeted.
Most folks getting in trouble get phished, or get their passwords exploited. Easier to hack the humans than to hack their devices.