Immediately, Apple stopped signing all iPhones for iOS 15.2 verification. Because of this as soon as customers improve their telephones to the most recent iOS 15.2.1 model, they’ll now not downgrade to 15.2 or earlier. This isn’t the primary time Apple is forcing a brand new system on iPhone customers. Earlier right now, there have been reviews that Apple will utterly cease updating iOS 14 and push iOS 15. Defending this choice, Apple claims that permitting customers to remain in iOS 14 was solely short-term.
Nevertheless, whether or not Apple stops updating iOS 14 or closes the iOS 15.2 verification channel, the goal is to make sure that customers upgrades to the brand new system. Judging from a current information, the improve charge of iOS 15 is worse than that of iOS 13 and iOS 14. Inside 4 years, the iOS 15 share is 57%. In distinction, iOS 14’s four-year share of installs is at 81%. For iOS 13, the set up charge was 77%. We will see that by way of set up, iOS 15 really performs worse than the iOS 13 and iOS 14.
The decrease improve charge is basically as a consequence of bugs in iOS 15 reminiscent of automated brightness failure, unstable battery life, and so on. These points make many customers unwilling to expertise the brand new system. Within the newest iOS 15.2.1 system, there was consumer suggestions, indicating that there’s a bug within the system. The keyboard quantity keys, delete keys and different keys don’t show accurately. The operation turns into caught after the improve and this makes many customers unwilling to improve.
iOS 15.2 units are weak to HomeKit Doorlock challenge
A brand new potential challenge has emerged and is affecting Apple HomeKit, which instantly impacts iOS 14.7 by the newer iOS 15.2. The problem is a persistent denial of service vulnerability that carries the “doorLock” moniker. The problem has been discovered on Apple HomeKit, which for these unaware, is a software program framework that lets iPhone and iPad customers management sensible dwelling home equipment instantly from their handsets.
Safety researcher, Trevor Spiniolas, publicly disclosed the main points of this vulnerability. In response to him, Apple has recognized concerning the flaw since August 10, 2021. To this point, almost 5 months have handed and the corporate didn’t handle the difficulty. In response to the researcher, regardless of the repeated guarantees to repair it, it stays unresolved. So as to set off “doorLock,’ an attacker would change the title of a HomeKit system to a string bigger than 500,000 characters.
Spinolas has launched a proof-of-concept exploit within the type of an iOS app. It has entry to Dwelling information and might change HomeKit system names even when the goal consumer doesn’t have any Dwelling units added on HomeKit.