For years, Apple has sold the myth of the “unhackable iPhone.” It’s a walled garden. A supposed fortress. A device marketed as so locked down that only nation-states could dream of breaking in. Wired’s latest reporting just confirmed iPhone’s worst-kept secret.
Wired revealed that a powerful iPhone exploit—DarkSword—has been circulating in the wild, capable of silently taking over hundreds of millions of iPhones running iOS 18.x simply by loading an infected webpage. No phishing. No user interaction. Just visit the wrong site, and your phone is theirs. This isn’t a boutique zero-day used against a single journalist. This is a watering-hole attack deployed across webpages, even government pages, news sites, and international targets. It hijacks legitimate iOS system processes, steals messages, passwords, iCloud data, and even crypto wallets—then wipes its tracks. And the most damning part? The exploit kit was found fully documented and copy-paste ready on compromised servers. That means the barrier to entry for attackers is now dangerously low.
Apple’s model is simple: one firmware stack, one update pipeline, one vendor controlling everything. That is mass control—easily abused. When a vulnerability hits a monoculture, it hits everyone. And when millions of devices lag behind the latest iOS version—as Wired notes—those users remain exposed indefinitely. This is the cybersecurity equivalent of planting the same crop across an entire continent. One blight, and the whole ecosystem collapses.
Purism has been warning about this for over a decade: centralized, opaque, proprietary systems control the users and cannot scale securely.
DarkSword thrives on hidden system processes and undocumented behaviors. Purism’s stack is free software that is 100% open, inspectable, and verifiable—meaning exploits can’t hide in the shadows.
Apple’s model forces users to wait for Cupertino to issue a patch. Purism’s model empowers the community, researchers, and independent auditors to identify and fix vulnerabilities collaboratively.
Even the most sophisticated fileless exploit can’t bypass a physical radio kill switch. If your baseband, Wi-Fi, or cameras are off at the hardware level, no software exploit can resurrect them.
DarkSword hijacks legitimate iOS processes to steal data. On PureOS, processes are transparent, sandboxed, and user-controlled. There’s no proprietary black box to piggyback on.
Wired notes that millions of users remain vulnerable because they’re stuck on older iOS versions. Purism devices don’t age out of security support. You’re not forced into a hardware upgrade just to stay safe.
Wired’s reporting is a symptom of a deeper structural problem: when a single company controls all their users with a single security model, the entire user base inherits that company’s mistakes. DarkSword is just the latest example. Coruna came before it. Others will follow. The threat landscape is evolving faster than any closed ecosystem can patch.
If you’re on iOS: Wired has a recommended list: update immediately—DarkSword affects iOS 18.4 to 18.6.2. Enable Lockdown Mode if you can’t update. Assume that visiting compromised sites could expose your data. This is a temporary solution to the larger problem of using a system where this will happen again.
If you want long-term safety: move toward platforms—such as PureOS—that prioritize user sovereignty, open security, and hardware-level protections. That’s the Purism model. Not because it’s trendy, but because it’s the only architecture that scales against modern threats.
Apple’s closed ecosystem is not a security model. It is a liability model. Every layer of opacity—every locked bootloader, every proprietary firmware blob, every undocumented subsystem—creates fertile ground for exploits like DarkSword.
Purism rejects this model entirely. We do not ask for blind trust. We provide verifiable security. We do not hide processes behind sealed partitions. We expose them to public scrutiny. We do not trap users in forced-upgrade cycles. We support devices for the long haul. Purism’s approach is not just different—it is fundamentally incompatible with the conditions that allowed DarkSword to flourish.
If you want a device that respects your autonomy, protects your data, and refuses to participate in the surveillance-by-design economy, Purism is the path forward. DarkSword will not be the last exploit to tear through closed ecosystems. But it will never find a foothold in a platform built on transparency, user control, and hardware-level protections.
| Model | Status | Lead Time | ||
|---|---|---|---|---|
![]() | Librem Key (Made in USA) | In Stock ($59+) | 10 business days | |
![]() | Liberty Phone (Made in USA Electronics) | In Stock ($1,999+) 4GB/128GB | 10 business days | |
![]() | Librem 5 | In Stock ($799+) 3GB/32GB | 10 business days | |
![]() | Librem 11 | In Stock ($999+) 8GB/1TB | 6+ weeks | |
![]() | Librem 14 | Out of stock | New Version in Development | |
![]() | Librem Mini | Out of stock | New Version in Development | |
![]() | Librem Server | In Stock ($2,999+) | 45 business days | |
![]() | Librem PQC Encryptor | Available Now, contact sales@puri.sm | 90 business days | |
![]() | Librem PQC Comms Server | Available Now, contact sales@puri.sm | 90 business days |