Reprinted from TidBITS by permission; reuse governed by Creative Commons license BY-NC-ND 3.0. TidBITS has offered years of thoughtful commentary on Apple and Internet topics. For free email subscriptions and access to the entire TidBITS archive, visit http://www.tidbits.com/ What's New in Apple's Platform Security Guide Adam Engst In January 2026, Apple updated the [1]Apple Platform Security Guide, bringing it up to date with operating system and technology changes since the December 2024 release and adding a few new sections. In March 2026, it released another small update. Although the Platform Security Guide can be dense reading for those of us who are not security experts, it's an essential resource for answering questions or correcting misconceptions about how Apple technologies protect our data. For instance, if you know someone who won't use Face ID because they believe that Apple stores pictures of their face, you can point to the [2]Biometric Security page that explains that Face ID data (which is a 2D infrared image plus depth maps) is only stored and processed in the dedicated [3]Secure Enclave subsystem within the device. Sadly, what the Platform Security Guide can't help with is conspiratorial beliefs that Apple is intentionally lying. That's possible'anything is possible'but radical theories require tangible, verified evidence to be anything more than fevered paranoia. Given Apple's position in the world, it's safe to assume that every facet of the Apple experience is under nonstop scrutiny by security researchers and malicious hackers alike. If Apple were lying about its security efforts, there would be no way to cover up all the breaches. New Sections In the updated Platform Security Guide, Apple has added several interesting sections. * [4]Mac on-screen camera indicator light is the only change in the March 2026 version, explaining how the MacBook Neo provides additional security for the camera feed to ensure that the on-screen camera indicator light can't be disabled or obscured by software. This change was necessary because the MacBook Neo, unlike other MacBook models, doesn't have a[5]hardware indicator lightto show when the camera is in use. Mac iSight webcams prior to 2008 could be reprogrammed to operate without turning on the LED indicator, a fact that came out in the [6]Lower Merion school laptop spying scandal and in a blackmail attempt against a [7]Miss Teen USA. Apple's mention of the MacBook Neo in the Platform Security Guide suggests the company is confident that the switch to a software-involved indicator won't be vulnerable to hacking. John Gruber has [8]more on this at Daring Fireball. * [9]Automatically Unlock Apple Devices explains all the ways that one Apple device can unlock another and how that process happens securely. If you've worried that it's not safe to have your iPhone unlock your Apple Watch, your Apple Watch unlock your Mac, or your Apple Watch unlock your iPhone when you're wearing a mask, this page should set your mind at rest. It also explains the security behind iPhone Mirroring, which lets you use your iPhone from your Mac. * [10]Communicating emergency information using satellitesprovides significantly more details about Apple's satellite communication systems and how they maintain security. No matter what communication type you're employing'Emergency SOS, Roadside Assistance, SMS, or iMessage'Apple establishes a secure connection between the device and an Apple datacenter. Apple then forwards the communication on to emergency services and roadside assistance partners, or to SMS carriers.Notably, the guide reveals a previously unknown detail: when you connect to the satellite in Messages, Apple intentionally doesn't send you incoming SMS messages unless you have sent the sender an off-grid message in the last 24 hours, or they are an approved sender in your emergency contacts or iCloud family members. Apple holds other SMS messages until you're back online with the cellular network. * [11]Quantum-secure cryptography in Apple operating systems outlines how Apple is preparing for a future with quantum computers that can quickly solve the mathematical problems at the heart of traditional cryptography. Although it's too early to know how quantum computing will power attacks against encrypted data, Apple and others assume that attackers have adopted a 'harvest now, decrypt later' approach where they collect massive amounts of encrypted data now with the expectation that a future quantum computer will enable them to decrypt it later. The cryptographic community has begun developing post-quantum cryptographic protocols, something Apple first mentioned in the context of iMessage several years ago (see '[12]New iMessage PQ3 Encryption Protocol Protects Against Post-Quantum Attacks,' 23 February 2024). Apple is famously secretive, but the Platform Security Guide is a notable exception. It's a detailed, public accounting of how Apple's security systems actually work. I don't expect many people to read it cover to cover, but keep it in mind. The next time you're trying to explain why Face ID is safe, or wondering whether some Apple security claim holds up, it's where to start looking. References 1. https://support.apple.com/guide/security/welcome/web 2. https://support.apple.com/guide/security/biometric-security-sec067eb0c9e/1/web/1 3. https://support.apple.com/guide/security/the-secure-enclave-sec59b0b31ff/1/web/1 4. https://support.apple.com/guide/security/mac-on-screen-camera-indicator-light-sec75a2d237d/1/web/1 5. https://support.apple.com/en-us/102177 6. https://www.macworld.com/article/202821/macbook_spycam.html 7. https://9to5mac.com/guides/mac-spyware/ 8. https://daringfireball.net/2026/03/apple_enclaves_neo_camera_indicator 9. https://support.apple.com/guide/security/automatically-unlock-apple-devices-sec6ab47ebfc/1/web/1 10. https://support.apple.com/guide/security/communicating-emergency-information-sec18a3be52a/1/web/1 11. https://support.apple.com/guide/security/quantum-secure-cryptography-apple-devices-secc7c82e533/1/web/1 12. https://tidbits.com/2024/02/23/new-imessage-pq3-encryption-protocol-protects-against-post-quantum-attacks/ .