Kenneth Van Wyk: With Gatekeeper, is Apple Big Brother or a practitioner of safer computing?
Warning: Many readers will not agree with this column, but that's because they are far more technically inclined than the average user.
Computerworld - I'm just going to come right out and say it: Mac and iPhone users are safer than Windows and Android users. There it is.
I can sense a tsunami of comments flooding in like never before, so allow me to explain what I mean.
There is vastly less malware (viruses, worms, botnets, etc.) on OS X and iOS than there is on Windows and, more recently, Android. We all acknowledge this. But many of you are saying that that doesn't mean that Apple's operating systems are more secure than Windows or Android. True. I didn't say they're more secure; I said they're safer.
What else do you have to knock down that statement? Ah, yes, there's less malware on OS X than on Windows because there are fewer Mac users than Windows users -- the bad guys simply write their heinous ware for the larger market. To which I say: That may be at least partially true in the case of OS X vs. Windows, but it flies in the face of reason when it comes to iOS vs. Android.
So now you're saying that the Android Markets are "free" and "open" vs. Apple's heavy-handed curation of its App Store. And now we're getting to an interesting discussion.
Apple users are safer for many reasons. We can talk about size of the Mac population vs. the Windows population, but I firmly believe the answer is far more complex than that (though I have no doubt that population size plays a role).
Apple's decision to curate the App Store and the Mac App Store suggests to some that the company has become the Big Brother it once mocked. I don't buy that. To me, it looks like part of a strategy for keeping its users safer. Another element of that strategy became evident with last week's announcement of the next version of OS X, Mountain Lion, and its Gatekeeper feature.
For all intents and purposes, iOS has had a "Gatekeeper" implicitly in its inner workings since day one. Now, Apple is bringing that to the Mac as well. What is it? It's a security subsystem that prevents unauthorized applications from being installed without the user's explicit permission. In Mountain Lion, those applications can come from the Mac App Store, or they can be digitally signed by a registered Mac application developer. Other software -- including malware and viruses -- are forbidden from being installed.
I know what a good portion of Computerworld's readership has to say about that sort of thing, though: I want more freedom as a user; I need to be able to do whatever I want with my computer. But Apple isn't doing anything to take away such freedom from the population of technically inclined users. You can continue to do as you please, while the masses of less technically accomplished users get a bit of protection from malware. The power to do whatever you want on your computer is something that the vast majority of users wouldn't want, seek or even know what to do with. And yet it's exactly the sort of power we've been providing them for years and years in the PC industry.
More by Kenneth van Wyk
- Kenneth van Wyk: Where mobile apps go wrong
- Kenneth van Wyk: Apple's big fail
- Kenneth van Wyk: After Snowden
- Kenneth van Wyk: Target breach underscores how backward U.S. payment tech is
- Kenneth van Wyk: Enjoy your trip, but protect the data you take with you
- Kenneth van Wyk: Lingering faults with security by default
- Kenneth van Wyk: High hopes for iPhone's Touch ID
- Kenneth van Wyk: Why mobile apps beat Web apps for privacy
- Bug bounties: Bad dog! Have a treat!
- How to avoid Big Brother's gaze
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts