Kenneth Van Wyk: With Gatekeeper, is Apple Big Brother or a practitioner of safer computing?
Warning: Many readers will not agree with this column, but that's because they are far more technically inclined than the average user.
Computerworld - I'm just going to come right out and say it: Mac and iPhone users are safer than Windows and Android users. There it is.
I can sense a tsunami of comments flooding in like never before, so allow me to explain what I mean.
There is vastly less malware (viruses, worms, botnets, etc.) on OS X and iOS than there is on Windows and, more recently, Android. We all acknowledge this. But many of you are saying that that doesn't mean that Apple's operating systems are more secure than Windows or Android. True. I didn't say they're more secure; I said they're safer.
What else do you have to knock down that statement? Ah, yes, there's less malware on OS X than on Windows because there are fewer Mac users than Windows users -- the bad guys simply write their heinous ware for the larger market. To which I say: That may be at least partially true in the case of OS X vs. Windows, but it flies in the face of reason when it comes to iOS vs. Android.
So now you're saying that the Android Markets are "free" and "open" vs. Apple's heavy-handed curation of its App Store. And now we're getting to an interesting discussion.
Apple users are safer for many reasons. We can talk about size of the Mac population vs. the Windows population, but I firmly believe the answer is far more complex than that (though I have no doubt that population size plays a role).
Apple's decision to curate the App Store and the Mac App Store suggests to some that the company has become the Big Brother it once mocked. I don't buy that. To me, it looks like part of a strategy for keeping its users safer. Another element of that strategy became evident with last week's announcement of the next version of OS X, Mountain Lion, and its Gatekeeper feature.
For all intents and purposes, iOS has had a "Gatekeeper" implicitly in its inner workings since day one. Now, Apple is bringing that to the Mac as well. What is it? It's a security subsystem that prevents unauthorized applications from being installed without the user's explicit permission. In Mountain Lion, those applications can come from the Mac App Store, or they can be digitally signed by a registered Mac application developer. Other software -- including malware and viruses -- are forbidden from being installed.
I know what a good portion of Computerworld's readership has to say about that sort of thing, though: I want more freedom as a user; I need to be able to do whatever I want with my computer. But Apple isn't doing anything to take away such freedom from the population of technically inclined users. You can continue to do as you please, while the masses of less technically accomplished users get a bit of protection from malware. The power to do whatever you want on your computer is something that the vast majority of users wouldn't want, seek or even know what to do with. And yet it's exactly the sort of power we've been providing them for years and years in the PC industry.
More by Kenneth van Wyk
- Kenneth van Wyk: Apple's big fail
- Kenneth van Wyk: After Snowden
- Kenneth van Wyk: Target breach underscores how backward U.S. payment tech is
- Kenneth van Wyk: Enjoy your trip, but protect the data you take with you
- Kenneth van Wyk: Lingering faults with security by default
- Kenneth van Wyk: High hopes for iPhone's Touch ID
- Kenneth van Wyk: Why mobile apps beat Web apps for privacy
- Bug bounties: Bad dog! Have a treat!
- How to avoid Big Brother's gaze
- The true root causes of software security failures
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts