I openly and willingly admit my general state of computer / techno ignorance. I'm wondering if some more technically savvy TUGGER might be able and willing to explain in comprehensible layman terms how malicious code in apps can somehow "get past" Apple when all apps supposedly get "screened" by Apple before becoming "approved" and then openly offered via the Apple Store?
This question is not a knock on Apple. My first smart phone after decades with a flip phone was (...and still is) a Apple 5s. I think the device is wonderful and truly impressive and I tip my cap to Apple. I like the device a lot and should have "converted" sooner.
I've read through the list of (known.....so far, anyhow) "hacked" apps and I don't have or want or use any of them, so my question is not "what happens to me now"?
My question is about internal procedure at Apple. Specifically, how do 80+ (...and counting?) apps containing malicious code (malicious code apparently discovered by others outside of Apple, by the way) manage to escape the notice of whatever Apple techies actually examine that stuff as their job responsibility before an app is subsequently offered through the Apple Store?
I'm just not grasping this at all.
This question is not a knock on Apple. My first smart phone after decades with a flip phone was (...and still is) a Apple 5s. I think the device is wonderful and truly impressive and I tip my cap to Apple. I like the device a lot and should have "converted" sooner.
I've read through the list of (known.....so far, anyhow) "hacked" apps and I don't have or want or use any of them, so my question is not "what happens to me now"?
My question is about internal procedure at Apple. Specifically, how do 80+ (...and counting?) apps containing malicious code (malicious code apparently discovered by others outside of Apple, by the way) manage to escape the notice of whatever Apple techies actually examine that stuff as their job responsibility before an app is subsequently offered through the Apple Store?
I'm just not grasping this at all.
Last edited: