Apple

matter-update-may-finally-take-the-tedium-out-of-setting-up-your-smart-home

Matter update may finally take the tedium out of setting up your smart home

There is no product category that better embodies the XKCD take on standards than smart home. With an ocean of connectivity options and incompatible standards, taming this mess has been challenging, but Matter could finally have a shot at making things a little less frustrating. The latest version of the standard has launched, offering multiple ways to streamline the usually aggravating setup process.

The first public release of Matter was in late 2022, but compatible systems didn’t get support until the following year. Now, there are Matter-certified devices like smart bulbs and sensors that will talk to Apple, Google, Amazon, and other smart home platforms. Matter 1.4.1 includes support for multi-device QR codes, NFC connection, and integrated terms and conditions—all of these have the potential to eliminate some very real smart home headaches.

It’s common for retailers to offer multi-packs of devices like light bulbs or smart plugs. That can save you some money, but setting up all those devices is tedious. With Matter 1.4.1, it might be much easier thanks to multi-device QR codes. Manufacturers can now include a QR code in the package that will pair all the included devices with your smart home system when scanned.

QR codes will still appear on individual devices for pairing, but it might not always be a QR code going forward. The new Matter also gives manufacturers the option of embedding NFC tags inside smart home gadgets. So all you have to do to add them to your system is tap your phone. That will be nice if you need to pair a device after it has been installed somewhere that obscures the visible code.

Matter update may finally take the tedium out of setting up your smart home Read More »

cue:-apple-will-add-ai-search-in-mobile-safari,-challenging-google

Cue: Apple will add AI search in mobile Safari, challenging Google

Apple executive Eddie Cue said that Apple is “actively looking at” shifting the focus of mobile Safari’s search experience to AI search engines, potentially challenging Google’s longstanding search dominance and the two companies’ lucrative default search engine deal. The statements were made while Cue testified for the US Department of Justice in the Alphabet/Google antitrust trial, as first reported in Bloomberg.

Cue noted that searches in Safari fell for the first time ever last year, and attributed the shift to users increasingly using large language model-based solutions to perform their searches.

“Prior to AI, my feeling around this was, none of the others were valid choices,” Cue said of the deal Apple had with Google, which is a key component in the DOJ’s case against Alphabet. He added: “I think today there is much greater potential because there are new entrants attacking the problem in a different way.”

Here he was alluding to companies like Perplexity, which seek to offer an alternative to semantic search engines with a chat-like approach—as well as others like OpenAI. Cue said Apple has had talks with Perplexity already.

Speaking of AI-based search engines in general, he said “we will add them to the list”—referring to the default search engine selector in Safari settings. That said, “they probably won’t be the default” because they still need to improve, particularly when it comes to indexing.

Cue: Apple will add AI search in mobile Safari, challenging Google Read More »

apps-like-kindle-are-already-taking-advantage-of-court-mandated-ios-app-store-changes

Apps like Kindle are already taking advantage of court-mandated iOS App Store changes

As of an update released today, the iOS app still doesn’t allow books to be purchased directly in the app, but you can search Amazon’s virtual bookstore inside the app and tap a new “Get Book” button that automatically pops you over to Amazon.com in your phone or tablet’s default browser. This is not as convenient for users as allowing them to purchase digital goods or services directly in the app, but it does make things a lot more friendly for users of apps whose developers don’t want to pay Apple a cut.

For the first time ever, the Kindle app on iOS can automatically direct book buyers to Amazon’s site to complete a purchase. Credit: Andrew Cunningham

Apple’s position on its App Store commissions has generally been, to write a high-level summary, that these third-party app developers benefit from the size and reach of Apple’s platform, the work Apple does to maintain the App Store and to make apps discoverable, and Apple’s payment processing services, among other benefits.

Even when it complied with a court order to allow third-party developers to use alternate payment processors in their apps, Apple still insisted on a 12 to 27 percent cut (rather than the usual 15 to 30 percent) to cover these other less-tangible benefits of offering apps and services on Apple’s devices. (Apple’s method of complying with that ruling, including onerous filing requirements for developers who used third-party payment services, was one of many things Judge Gonzalez criticized Apple for in last week’s ruling.)

A new headache for Apple

Apple is appealing last week’s ruling, and it may well succeed in the end, giving the company the ability to roll back these rule changes and once again force developers to either use Apple’s in-app payments or force users to buy goods and services externally. But even if this change is only temporary, it still creates new potential PR headaches for Apple.

Apps like Kindle are already taking advantage of court-mandated iOS App Store changes Read More »

spotify-seizes-the-day-after-apple-is-forced-to-allow-external-payments

Spotify seizes the day after Apple is forced to allow external payments

After a federal court issued a scathing order Wednesday night that found Apple in “willful violation” of an injunction meant to allow iOS apps to provide alternate payment options, app developers are capitalizing on the moment. Spotify may be the quickest of them all.

Less than 24 hours after District Court Judge Yvonne Gonzalez Rogers found that Apple had sought to thwart a 2021 injunction and engaged in an “obvious cover-up” around its actions, Spotify announced in a blog post that it had submitted an updated app to Apple. The updated app can show specific plan prices, link out to Spotify’s website for plan changes and purchases that avoid Apple’s 30 percent commission on in-app purchases, and display promotional offers, all of which were disallowed under Apple’s prior App Store rules.

Spotify’s post adds that Apple’s newly court-enforced policy “opens the door to other seamless buying opportunities that will directly benefit creators (think easy-to-purchase audiobooks).” Spotify posted on X (formerly Twitter) Friday morning that the updated app was approved by Apple. Apple made substantial modifications to its App Review Guidelines on Friday and emailed registered developers regarding the changes.

Spotify seizes the day after Apple is forced to allow external payments Read More »

fortnite-will-return-to-ios-as-court-slams-apple’s-“interference“-and-”cover-up“

Fortnite will return to iOS as court slams Apple’s “interference“ and ”cover-up“

In a statement provided to Ars Technica, an Apple spokesperson said, “We strongly disagree with the decision. We will comply with the court’s order and we will appeal.”

An Epic return

With the new court order in place, Epic says it will once again submit a version of Fortnite to the iOS App Store in the US in the next week or so. That new version will offer players the option to use standard Apple App Store payments or its own, cheaper “Epic Direct Payment” system to purchase in-game currency and items.

That would mirror the system that was briefly in place for iOS players in August 2020, when Epic added alternate payment options to iOS Fortnite in intentional violation of what were then Apple’s store policies. Apple removed Fortnite from the iOS App Store hours later, setting off a legal battle that seems to finally be reaching its conclusion.

For those few hours when Epic Direct Payments were available on iOS Fortnite in 2020, Sweeney said that about 50 percent of customers “decided to give Epic a shot,” going through an additional step to register and pay through an Epic account on a web page outside the app itself (and saving 20 percent on their purchase in the process). The other roughly 50 percent of customers decided to pay a higher price in exchange for the convenience of paying directly in the app through the iOS account they already had set up, Sweeney said. “Consumers were making the choice… and it was a wonderful thing to see,” he said.

Speaking to the press Wednesday night, Sweeney said the new court order was a “huge victory for developers” looking to offer their own payment service alongside Apple’s on iOS devices. “This is what we’ve wanted all along,” he said. “We think that this achieves the goal that we’ve been aiming for in the US, while there are still some challenges elsewhere in the world.”

While Sweeney said the specific iOS developer account Epic used to publish Fortnite in 2020 is still banned, he added that the company has several other developer accounts that could be used for the new submission, including one it has used to support Unreal Engine on Apple devices. And while Sweeney allowed that Apple could still “arbitrarily reject Epic from the App Store despite Epic following all the rules,” he added that, in light of this latest court ruling, Apple would now “have to deal with various consequences of that if they did.”

Fortnite will return to iOS as court slams Apple’s “interference“ and ”cover-up“ Read More »

millions-of-apple-airplay-enabled-devices-can-be-hacked-via-wi-fi

Millions of Apple Airplay-enabled devices can be hacked via Wi-Fi

Oligo also notes that many of the vulnerable devices have microphones and could be turned into listening devices for espionage. The researchers did not go so far as to create proof-of-concept malware for any particular target that would demonstrate that trick.

Oligo says it warned Apple about its AirBorne findings in the late fall and winter of last year, and Apple responded in the months since then by pushing out security updates. The researchers collaborated with Apple to test and validate the fixes for Macs and other Apple products.

Apple tells WIRED that it has also created patches that are available for impacted third-party devices. The company emphasizes, though, that there are limitations to the attacks that would be possible on AirPlay-enabled devices as a result of the bugs, because an attacker must be on the same Wi-Fi network as a target to exploit them. Apple adds that while there is potentially some user data on devices like TVs and speakers, it is typically very limited.

Below is a video of the Oligo researchers demonstrating their AirBorne hacking technique to take over an AirPlay-enabled Bose speaker to show their company’s logo for AirBorne. (The researchers say they didn’t intend to single out Bose, but just happened to have one of the company’s speakers on hand for testing.) Bose did not immediately respond to WIRED’s request for comment.

Speaker Demo. Courtesy of Oligo

The AirBorne vulnerabilities Oligo found also affect CarPlay, the radio protocol used to connect to vehicles’ dashboard interfaces. Oligo warns that this means hackers could hijack a car’s automotive computer, known as its head unit, in any of more than 800 CarPlay-enabled car and truck models. In those car-specific cases, though, the AirBorne vulnerabilities could only be exploited if the hacker is able to pair their own device with the head unit via Bluetooth or a USB connection, which drastically restricts the threat of CarPlay-based vehicle hacking.

The AirPlay SDK flaws in home media devices, by contrast, may present a more practical vulnerability for hackers seeking to hide on a network, whether to install ransomware or carry out stealthy espionage, all while hiding on devices that are often forgotten by both consumers and corporate or government network defenders. “The amount of devices that were vulnerable to these issues, that’s what alarms me,” says Oligo researcher Uri Katz. “When was the last time you updated your speaker?”

Millions of Apple Airplay-enabled devices can be hacked via Wi-Fi Read More »

ios-and-android-juice-jacking-defenses-have-been-trivial-to-bypass-for-years

iOS and Android juice jacking defenses have been trivial to bypass for years


SON OF JUICE JACKING ARISES

New ChoiceJacking attack allows malicious chargers to steal data from phones.

Credit: Aurich Lawson | Getty Images

Credit: Aurich Lawson | Getty Images

About a decade ago, Apple and Google started updating iOS and Android, respectively, to make them less susceptible to “juice jacking,” a form of attack that could surreptitiously steal data or execute malicious code when users plug their phones into special-purpose charging hardware. Now, researchers are revealing that, for years, the mitigations have suffered from a fundamental defect that has made them trivial to bypass.

“Juice jacking” was coined in a 2011 article on KrebsOnSecurity detailing an attack demonstrated at a Defcon security conference at the time. Juice jacking works by equipping a charger with hidden hardware that can access files and other internal resources of phones, in much the same way that a computer can when a user connects it to the phone.

An attacker would then make the chargers available in airports, shopping malls, or other public venues for use by people looking to recharge depleted batteries. While the charger was ostensibly only providing electricity to the phone, it was also secretly downloading files or running malicious code on the device behind the scenes. Starting in 2012, both Apple and Google tried to mitigate the threat by requiring users to click a confirmation button on their phones before a computer—or a computer masquerading as a charger—could access files or execute code on the phone.

The logic behind the mitigation was rooted in a key portion of the USB protocol that, in the parlance of the specification, dictates that a USB port can facilitate a “host” device or a “peripheral” device at any given time, but not both. In the context of phones, this meant they could either:

  • Host the device on the other end of the USB cord—for instance, if a user connects a thumb drive or keyboard. In this scenario, the phone is the host that has access to the internals of the drive, keyboard or other peripheral device.
  • Act as a peripheral device that’s hosted by a computer or malicious charger, which under the USB paradigm is a host that has system access to the phone.

An alarming state of USB security

Researchers at the Graz University of Technology in Austria recently made a discovery that completely undermines the premise behind the countermeasure: They’re rooted under the assumption that USB hosts can’t inject input that autonomously approves the confirmation prompt. Given the restriction against a USB device simultaneously acting as a host and peripheral, the premise seemed sound. The trust models built into both iOS and Android, however, present loopholes that can be exploited to defeat the protections. The researchers went on to devise ChoiceJacking, the first known attack to defeat juice-jacking mitigations.

“We observe that these mitigations assume that an attacker cannot inject input events while establishing a data connection,” the researchers wrote in a paper scheduled to be presented in August at the Usenix Security Symposium in Seattle. “However, we show that this assumption does not hold in practice.”

The researchers continued:

We present a platform-agnostic attack principle and three concrete attack techniques for Android and iOS that allow a malicious charger to autonomously spoof user input to enable its own data connection. Our evaluation using a custom cheap malicious charger design reveals an alarming state of USB security on mobile platforms. Despite vendor customizations in USB stacks, ChoiceJacking attacks gain access to sensitive user files (pictures, documents, app data) on all tested devices from 8 vendors including the top 6 by market share.

In response to the findings, Apple updated the confirmation dialogs in last month’s release of iOS/iPadOS 18.4 to require a user authentication in the form of a PIN or password. While the researchers were investigating their ChoiceJacking attacks last year, Google independently updated its confirmation with the release of version 15 in November. The researchers say the new mitigation works as expected on fully updated Apple and Android devices. Given the fragmentation of the Android ecosystem, however, many Android devices remain vulnerable.

All three of the ChoiceJacking techniques defeat Android juice-jacking mitigations. One of them also works against those defenses in Apple devices. In all three, the charger acts as a USB host to trigger the confirmation prompt on the targeted phone.

The attacks then exploit various weaknesses in the OS that allow the charger to autonomously inject “input events” that can enter text or click buttons presented in screen prompts as if the user had done so directly into the phone. In all three, the charger eventually gains two conceptual channels to the phone: (1) an input one allowing it to spoof user consent and (2) a file access connection that can steal files.

An illustration of ChoiceJacking attacks. (1) The victim device is attached to the malicious charger. (2) The charger establishes an extra input channel. (3) The charger initiates a data connection. User consent is needed to confirm it. (4) The charger uses the input channel to spoof user consent. Credit: Draschbacher et al.

It’s a keyboard, it’s a host, it’s both

In the ChoiceJacking variant that defeats both Apple- and Google-devised juice-jacking mitigations, the charger starts as a USB keyboard or a similar peripheral device. It sends keyboard input over USB that invokes simple key presses, such as arrow up or down, but also more complex key combinations that trigger settings or open a status bar.

The input establishes a Bluetooth connection to a second miniaturized keyboard hidden inside the malicious charger. The charger then uses the USB Power Delivery, a standard available in USB-C connectors that allows devices to either provide or receive power to or from the other device, depending on messages they exchange, a process known as the USB PD Data Role Swap.

A simulated ChoiceJacking charger. Bidirectional USB lines allow for data role swaps. Credit: Draschbacher et al.

With the charger now acting as a host, it triggers the file access consent dialog. At the same time, the charger still maintains its role as a peripheral device that acts as a Bluetooth keyboard that approves the file access consent dialog.

The full steps for the attack, provided in the Usenix paper, are:

1. The victim device is connected to the malicious charger. The device has its screen unlocked.

2. At a suitable moment, the charger performs a USB PD Data Role (DR) Swap. The mobile device now acts as a USB host, the charger acts as a USB input device.

3. The charger generates input to ensure that BT is enabled.

4. The charger navigates to the BT pairing screen in the system settings to make the mobile device discoverable.

5. The charger starts advertising as a BT input device.

6. By constantly scanning for newly discoverable Bluetooth devices, the charger identifies the BT device address of the mobile device and initiates pairing.

7. Through the USB input device, the charger accepts the Yes/No pairing dialog appearing on the mobile device. The Bluetooth input device is now connected.

8. The charger sends another USB PD DR Swap. It is now the USB host, and the mobile device is the USB device.

9. As the USB host, the charger initiates a data connection.

10. Through the Bluetooth input device, the charger confirms its own data connection on the mobile device.

This technique works against all but one of the 11 phone models tested, with the holdout being an Android device running the Vivo Funtouch OS, which doesn’t fully support the USB PD protocol. The attacks against the 10 remaining models take about 25 to 30 seconds to establish the Bluetooth pairing, depending on the phone model being hacked. The attacker then has read and write access to files stored on the device for as long as it remains connected to the charger.

Two more ways to hack Android

The two other members of the ChoiceJacking family work only against the juice-jacking mitigations that Google put into Android. In the first, the malicious charger invokes the Android Open Access Protocol, which allows a USB host to act as an input device when the host sends a special message that puts it into accessory mode.

The protocol specifically dictates that while in accessory mode, a USB host can no longer respond to other USB interfaces, such as the Picture Transfer Protocol for transferring photos and videos and the Media Transfer Protocol that enables transferring files in other formats. Despite the restriction, all of the Android devices tested violated the specification by accepting AOAP messages sent, even when the USB host hadn’t been put into accessory mode. The charger can exploit this implementation flaw to autonomously complete the required user confirmations.

The remaining ChoiceJacking technique exploits a race condition in the Android input dispatcher by flooding it with a specially crafted sequence of input events. The dispatcher puts each event into a queue and processes them one by one. The dispatcher waits for all previous input events to be fully processed before acting on a new one.

“This means that a single process that performs overly complex logic in its key event handler will delay event dispatching for all other processes or global event handlers,” the researchers explained.

They went on to note, “A malicious charger can exploit this by starting as a USB peripheral and flooding the event queue with a specially crafted sequence of key events. It then switches its USB interface to act as a USB host while the victim device is still busy dispatching the attacker’s events. These events therefore accept user prompts for confirming the data connection to the malicious charger.”

The Usenix paper provides the following matrix showing which devices tested in the research are vulnerable to which attacks.

The susceptibility of tested devices to all three ChoiceJacking attack techniques. Credit: Draschbacher et al.

User convenience over security

In an email, the researchers said that the fixes provided by Apple and Google successfully blunt ChoiceJacking attacks in iPhones, iPads, and Pixel devices. Many Android devices made by other manufacturers, however, remain vulnerable because they have yet to update their devices to Android 15. Other Android devices—most notably those from Samsung running the One UI 7 software interface—don’t implement the new authentication requirement, even when running on Android 15. The omission leaves these models vulnerable to ChoiceJacking. In an email, principal paper author Florian Draschbacher wrote:

The attack can therefore still be exploited on many devices, even though we informed the manufacturers about a year ago and they acknowledged the problem. The reason for this slow reaction is probably that ChoiceJacking does not simply exploit a programming error. Rather, the problem is more deeply rooted in the USB trust model of mobile operating systems. Changes here have a negative impact on the user experience, which is why manufacturers are hesitant. [It] means for enabling USB-based file access, the user doesn’t need to simply tap YES on a dialog but additionally needs to present their unlock PIN/fingerprint/face. This inevitably slows down the process.

The biggest threat posed by ChoiceJacking is to Android devices that have been configured to enable USB debugging. Developers often turn on this option so they can troubleshoot problems with their apps, but many non-developers enable it so they can install apps from their computer, root their devices so they can install a different OS, transfer data between devices, and recover bricked phones. Turning it on requires a user to flip a switch in Settings > System > Developer options.

If a phone has USB Debugging turned on, ChoiceJacking can gain shell access through the Android Debug Bridge. From there, an attacker can install apps, access the file system, and execute malicious binary files. The level of access through the Android Debug Mode is much higher than that through Picture Transfer Protocol and Media Transfer Protocol, which only allow read and write access to system files.

The vulnerabilities are tracked as:

    • CVE-2025-24193 (Apple)
    • CVE-2024-43085 (Google)
    • CVE-2024-20900 (Samsung)
    • CVE-2024-54096 (Huawei)

A Google spokesperson confirmed that the weaknesses were patched in Android 15 but didn’t speak to the base of Android devices from other manufacturers, who either don’t support the new OS or the new authentication requirement it makes possible. Apple declined to comment for this post.

Word that juice-jacking-style attacks are once again possible on some Android devices and out-of-date iPhones is likely to breathe new life into the constant warnings from federal authorities, tech pundits, news outlets, and local and state government agencies that phone users should steer clear of public charging stations.

As I reported in 2023, these warnings are mostly scaremongering, and the advent of ChoiceJacking does little to change that, given that there are no documented cases of such attacks in the wild. That said, people using Android devices that don’t support Google’s new authentication requirement may want to refrain from public charging.

Photo of Dan Goodin

Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.

iOS and Android juice jacking defenses have been trivial to bypass for years Read More »

report:-apple-will-take-another-crack-at-ipad-multitasking-in-ipados-19

Report: Apple will take another crack at iPad multitasking in iPadOS 19

Apple is taking another crack at iPad multitasking, according to a report from Bloomberg’s Mark Gurman. This year’s iPadOS 19 release, due to be unveiled at Apple’s Worldwide Developers Conference on June 9, will apparently include an “overhaul that will make the tablet’s software more like macOS.”

The report is light on details about what’s actually changing, aside from a broad “focus on productivity, multitasking, and app window management.” But Apple will apparently continue to stop short of allowing users of newer iPads to run macOS on their tablets, despite the fact that modern iPad Airs and Pros use the same processors as Macs.

If this is giving you déjà vu, you’re probably thinking about iPadOS 16, the last time Apple tried making significant upgrades to the iPad’s multitasking model. Gurman’s reporting at the time even used similar language, saying that iPads running the new software would work “more like a laptop and less like a phone.”

The result of those efforts was Stage Manager. It had steep hardware requirements and launched in pretty rough shape, even though Apple delayed the release of the update by a month to keep polishing it. Stage Manager did allow for more flexible multitasking, and on newer models, it enabled true multi-monitor support for the first time. But early versions were buggy and frustrating in ways that still haven’t fully been addressed by subsequent updates (MacStories’ Federico Viticci keeps the Internet’s most comprehensive record of the issues with the software.)

Report: Apple will take another crack at iPad multitasking in iPadOS 19 Read More »

after-market-tumult,-trump-exempts-smartphones-from-massive-new-tariffs

After market tumult, Trump exempts smartphones from massive new tariffs

Shares in the US tech giant were one of Wall Street’s biggest casualties in the days immediately after Trump announced his reciprocal tariffs. About $700 billion was wiped off Apple’s market value in the space of a few days.

Earlier this week, Trump said he would consider excluding US companies from his tariffs, but added that such decisions would be made “instinctively.”

Chad Bown, a senior fellow at the Peterson Institute for International Economics, said the exemptions mirrored exceptions for smartphones and consumer electronics issued by Trump during his trade wars in 2018 and 2019.

“We’ll have to wait and see if the exemptions this time around also stick, or if the president once again reverses course sometime in the not-too-distant future,” said Bown.

US Customs and Border Protection referred inquiries about the order to the US International Trade Commission, which did not immediately reply to a request for comment.

The White House confirmed that the new exemptions would not apply to the 20 percent tariffs on all Chinese imports applied by Trump to respond to China’s role in fentanyl manufacturing.

White House spokesperson Karoline Leavitt said on Saturday that companies including Apple, TSMC, and Nvidia were “hustling to onshore their manufacturing in the United States as soon as possible” at “the direction of the President.”

“President Trump has made it clear America cannot rely on China to manufacture critical technologies such as semiconductors, chips, smartphones, and laptops,” said Leavitt.

Apple declined to comment.

Economists have warned that the sweeping nature of Trump’s tariffs—which apply to a broad range of common US consumer goods—threaten to fuel US inflation and hit economic growth.

New York Fed chief John Williams said US inflation could reach as high as 4 percent as a result of Trump’s tariffs.

Additional reporting by Michael Acton in San Francisco

© 2025 The Financial Times Ltd. All rights reserved. Not to be redistributed, copied, or modified in any way.

After market tumult, Trump exempts smartphones from massive new tariffs Read More »

apple-silent-as-trump-promises-“impossible”-us-made-iphones

Apple silent as Trump promises “impossible” US-made iPhones


How does Apple solve a problem like Trump’s trade war?

Despite a recent pause on some tariffs, Apple remains in a particularly thorny spot as Donald Trump’s trade war spikes costs in the tech company’s iPhone manufacturing hub, China.

Analysts predict that Apple has no clear short-term options to shake up its supply chain to avoid tariffs entirely, and even if Trump grants Apple an exemption, iPhone prices may increase not just in the US but globally.

The US Trade Representative, which has previously granted Apple an exemption on a particular product, did not respond to Ars’ request to comment on whether any requests for exemptions have been submitted in 2025.

Currently, the US imposes a 145 percent tariff on Chinese imports, while China has raised tariffs on US imports to 125 percent.

Neither side seems ready to back down, and Trump’s TikTok deal—which must be approved by the Chinese government—risks further delays the longer negotiations and retaliations drag on. Trump has faced criticism for delaying the TikTok deal, with Senate Intelligence Committee Vice Chair Mark Warner (D-Va.) telling The Verge last week that the delay was “against the law” and threatened US national security. Meanwhile, China seems to expect more business to flow into China rather than into the US as a result of Trump’s tough stance on global trade.

With the economy and national security at risk, Trump is claiming that tariffs will drive manufacturing into the US, create jobs, and benefit the economy. Getting the world’s most valuable company, Apple, to manufacture its most popular product, the iPhone, in the US, is clearly part of Trump’s vision. White House Press Secretary Karoline Leavitt told reporters this week that Apple’s commitment to invest $500 billion in the US over the next four years was supposedly a clear indicator that Apple believed it was feasible to build iPhones here, Bloomberg reported.

“If Apple didn’t think the United States could do it, they probably wouldn’t have put up that big chunk of change,” Leavitt said.

Apple did not respond to Ars’ request to comment, and so far, it has been silent on how tariffs are impacting its business.

iPhone price increases expected globally

For Apple, even if it can build products for the US market in India, where tariffs remain lower, Trump’s negotiations with China “remain the most important variable for Apple” to retain its global dominance.

Dan Ives, global head of technology research at Wedbush Securities, told CNBC that “Apple could be set back many years by these tariffs.” Although Apple reportedly stockpiled phones to sell in the US market, that supply will likely dwindle fast as customers move to purchase phones before prices spike. In the medium-term, consultancy firm Omdia forecasted, Apple will likely “focus on increasing iPhone production and exports from India” rather than pushing its business into the US, as Trump desires.

But Apple will still incur additional costs from tariffs on India until that country tries to negotiate a more favorable trade deal. And any exemption that Apple may secure due to its investment promise in the US or moderation of China tariffs that could spare Apple some pain “may not be enough for Apple to avoid adverse business effects,” co-founder and senior analyst at equity research publisher MoffettNathanson, Craig Moffett, suggested to CNBC.

And if Apple is forced to increase prices, it likely won’t be limited to just the US, Bank of America Securities analyst Wamsi Mohan suggested, as reported by The Guardian. To ensure that Apple’s largest market isn’t the hardest hit, Apple may increase prices “across the board geographically,” he forecasted.

“While Apple has not commented on this, we expect prices will be changed globally to prevent arbitrage,” Mohan said.

Apple may even choose to increase prices everywhere but the US, vice president at Forrester Research, Dipanjan Chatterjee, explained in The Guardian’s report.

“If there is a cost impact in the US for certain products,” Chatterjee said, Apple may not increase US prices because “the market is far more competitive there.” Instead, “the company may choose to keep prices flat in the US while recovering the lost margin elsewhere in its global portfolio,” Chatterjee said.

Trump’s US-made iPhone may be an impossible dream

Analysts have said that Trump’s dream that a “made-in-the-USA” iPhone could be coming soon is divorced from reality. Not only do analysts estimate that more than 80 percent of Apple products are currently made in China, but so are many individual parts. So even if Apple built an iPhone factory in the US, it would still have to pay tariffs on individual parts, unless Trump agreed to a seemingly wide range of exemptions. Mohan estimated it would “likely take many years” to move the “entire iPhone supply chain,” if that’s “even possible.”

Further, Apple’s $500 billion commitment covered “building servers for its artificial intelligence products, Apple TV productions and 20,000 new jobs in research and development—not a promise to make the iPhone stateside,” The Guardian noted.

For Apple, it would likely take years to build a US factory and attract talent, all without knowing how tariffs might change. A former Apple manufacturing engineer, Matthew Moore, told Bloomberg that “there are millions of people employed by the Apple supply chain in China,” and Apple has long insisted that the US talent pool is too small to easily replace them.

“What city in America is going to put everything down and build only iPhones?” Moore said. “Boston is over 500,000 people. The whole city would need to stop everything and start assembling iPhones.”

In a CBS interview, Commerce Secretary Howard Lutnick suggested that the “army of millions and millions of human beings” could be automated, Bloomberg reported. But China has never been able to make low-cost automation work, so it’s unclear how the US could achieve that goal without serious investment.

“That’s not yet realistic,” people who have worked on Apple’s product manufacturing told Bloomberg, especially since each new iPhone model requires retooling of assembly, which typically requires manual labor. Other analysts agreed, CNBC reported, concluding that “the idea of an American-made iPhone is impossible at worst and highly expensive at best.”

For consumers, CNBC noted, a US-made iPhone would cost anywhere from 25 percent more than the $1,199 price point today, increasing to about $1,500 at least, to potentially $3,500 at most, Wall Street analysts have forecasted.

It took Apple a decade to build its factory in India, which Apple reportedly intends to use to avoid tariffs where possible. That factory “only began producing Apple’s top-of-the-line Pro and Pro Max iPhone models for the first time last year,” CNBC reported.

Analysts told CNBC that it would take years to launch a similar manufacturing process in the US, while “there’s no guarantee that US trade policy might not change yet again in a way to make the factory less useful.”

Apple CEO’s potential game plan to navigate tariffs

It appears that there’s not much Apple can do to avoid maximum pain through US-China negotiations. But Apple’s CEO Tim Cook—who is considered “a supply chain whisperer”—may be “uniquely suited” to navigate Trump’s trade war, Fortune reported.

After Cook arrived at Apple in 1998, he “redesigned Apple’s sprawling supply chain” and perhaps is game to do that again, Fortune reported. Jeremy Friedman, associate professor of business and geopolitics at Harvard Business School, told Fortune that rather than being stuck in the middle, Cook may turn out to be a key intermediary, helping the US and China iron out a deal.

During Trump’s last term, Cook raised a successful “charm offensive” that secured tariff exemptions without caving to Trump’s demand to build iPhones in the US, CNBC reported, and he’s likely betting that Apple’s recent $500 billion commitment will lead to similar outcomes, even if Apple never delivers a US-made iPhone.

Back in 2017, Trump announced that Apple partner Foxconn would be building three “big beautiful plants” in the US and claimed that they would be Apple plants, CNBC reported. But the pandemic disrupted construction, and most of those plans were abandoned, with one facility only briefly serving to make face masks, not Apple products. In 2019, Apple committed to building a Texas factory that Trump toured. While Trump insisted that a US-made iPhone was on the horizon due to Apple moving some business into the US, that factory only committed to assembling the MacBook Pro, CNBC noted.

Morgan Stanley analyst Erik Woodring suggested that Apple may “commit to some small-volume production in the US (HomePod? AirTags?)” to secure an exemption in 2025, rather than committing to building iPhones, CNBC reported.

Although this perhaps sounds like a tried-and-true game plan, for Cook, Apple’s logistics have likely never been so complicated. However, analysts told Fortune that experienced logistics masterminds understand that flexibility is the priority, and Cook has already shown that he can anticipate Trump’s moves by stockpiling iPhones and redirecting US-bound iPhones through its factory in India.

While Trump negotiates with China, Apple hopes that an estimated 35 million iPhones it makes annually in India can “cover a large portion of its needs in the US,” Bloomberg reported. These moves, analysts said, prove that Cook may be the man for the job when it comes to steering Apple through the trade war chaos.

But to keep up with global demand—selling more than 220 million iPhones annually—Apple will struggle to quickly distance itself from China, where there’s abundant talent to scale production that Apple says just doesn’t exist in the US. For example, CNBC noted that Foxconn hired 50,000 additional workers last fall at its largest China plant just to build enough iPhones to meet demand during the latest September launches.

As Apple remains dependent on China, Cook will likely need to remain at the table, seeking friendlier terms on both sides to ensure its business isn’t upended for years.

“One can imagine, if there is some sort of grand bargain between US and China coming in the next year or two,” Friedman said, “Tim Cook might as soon as anybody play an intermediary role.”

Photo of Ashley Belanger

Ashley is a senior policy reporter for Ars Technica, dedicated to tracking social impacts of emerging policies and new technologies. She is a Chicago-based journalist with 20 years of experience.

Apple silent as Trump promises “impossible” US-made iPhones Read More »

apple-enables-rcs-messaging-for-google-fi-subscribers-at-last

Apple enables RCS messaging for Google Fi subscribers at last

With RCS, iPhone users can converse with non-Apple users without losing the enhanced features to which they’ve become accustomed in iMessage. That includes longer messages, HD media, typing indicators, and much more. Google Fi has several different options for data plans, and the company notes that RCS does use mobile data when away from Wi-Fi. Those on the “Flexible” Fi plan pay for blocks of data as they go, and using RCS messaging could inadvertently increase their bill.

If that’s not a concern, it’s a snap for Fi users to enable RCS on the new iOS update. Head to Apps > Messages, and then find the Text Messaging section to toggle on RCS. It may, however, take a few minutes for your phone number to be registered with the Fi RCS server.

In hindsight, the way Apple implemented iMessage was clever. By intercepting messages being sent to other iPhone phone numbers, Apple was able to add enhanced features to its phones instantly. It had the possibly intended side effect of reinforcing the perception that Android phones were less capable. This turned Android users into dreaded green bubbles that limited chat features. Users complained, and Google ran ads calling on Apple to support RCS. That, along with some pointed questions from reporters may have prompted Apple to announce the change in late 2023. It took some time, but you almost don’t have to worry about missing messaging features in 2025.

Apple enables RCS messaging for Google Fi subscribers at last Read More »

apple-updates-all-its-operating-systems,-brings-apple-intelligence-to-vision-pro

Apple updates all its operating systems, brings Apple Intelligence to Vision Pro

Apple dropped a big batch of medium-size software updates for nearly all of its products this afternoon. The iOS 18.4, iPadOS 18.4, macOS 15.4, tvOS 18.4, and visionOS 2.4 updates are all currently available to download, and each adds a small handful of new features for their respective platforms.

A watchOS 11.4 update was also published briefly, but it’s currently unavailable.

For iPhones and iPads that support Apple Intelligence, the flagship feature in 18.4 is Priority Notifications, which attempts to separate time-sensitive or potentially important notifications from the rest of them so you can see them more easily. The update also brings along the handful of new Unicode 16.0 emoji, a separate app for managing a Vision Pro headset (similar to the companion app for the Apple Watch), and a grab bag of other fixes and minor enhancements.

The Mac picks up two major features in the Sequoia 15.4 update. Users of the Mail app now get the same (optional) automated inbox sorting that Apple introduced for iPhones and iPads in an earlier update, attempting to tame overgrown inboxes using Apple Intelligence language models.

The Mac is also getting a long-standing Quick Start setup feature from the Apple Watch, Apple TV, iPhone, and iPad. On those devices, you can activate them and sign in to your Apple ID by holding another compatible Apple phone or tablet in close proximity. Macs running the 15.4 update finally support the same feature (though it won’t work Mac-to-Mac, since a rear-facing camera is a requirement).

Apple updates all its operating systems, brings Apple Intelligence to Vision Pro Read More »