Home
Lockdown tools against consumer spyware
2026-05-24
Lockdown-style modes have quietly become the security feature that matters most for people who actually face spyware. Bright screens, familiar icons, but under the glass the rules change fast.
Apple takes the most aggressive stance. Its Lockdown Mode sharply limits attack surface by disabling just-in-time JavaScript compilation, blocking most message attachments, and filtering unknown FaceTime calls, a set of constraints that directly undermines common exploit chains used in commercial surveillance tools. Users enable it through Settings, then Privacy and Security, with a reboot sealing the tighter configuration.
Google ties its answer to identity rather than a single device. Advanced Protection for Android and Google accounts leans on hardware security keys, stricter OAuth controls, and reduced background data access, turning routine sign-ins into a higher-friction but safer authentication workflow. On Pixel hardware, extra exploit mitigations pair with this program to reduce successful remote code execution across apps and the browser.
Meta focuses on the social layer. Security Checkup and Facebook Protect steer high-risk users toward stronger login protections, more granular session management, and alerts about suspicious access to Messenger and linked apps, tightening the social graph that spyware operators often abuse for phishing and social engineering. Toggled from account settings, these modes do not stop infections alone but make the initial compromise significantly harder.
Recommendations
Loading...