{"id":48157,"date":"2022-08-25T15:10:52","date_gmt":"2022-08-25T15:10:52","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33771\/Websites-Can-Identify-If-Youre-Using-iPhones-New-Lockdown-Mode.html"},"modified":"2022-08-25T15:10:52","modified_gmt":"2022-08-25T15:10:52","slug":"websites-can-identify-if-youre-using-iphones-new-lockdown-mode","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/","title":{"rendered":"Websites Can Identify If You&#8217;re Using iPhone&#8217;s New Lockdown Mode"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6306641cb26c97009c4a7139\/lede\/1661364857331-iphone-lockdown-more.jpeg?crop=1xw:0.8643xh;0xw,0.1357xh&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6306641cb26c97009c4a7139\/lede\/1661364857331-iphone-lockdown-more.jpeg?crop=1xw:0.8643xh;0xw,0.1357xh&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6306641cb26c97009c4a7139\/lede\/1661364857331-iphone-lockdown-more.jpeg?crop=1xw:0.8643xh;0xw,0.1357xh&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"A woman using an iPhone.\"><\/picture><\/div>\n<p>Image:&nbsp;Urupong\/Getty Images<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"78.36359414906\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29.612903225806\"><\/p>\n<p>Once Apple launches the new iPhone and iPad operating system early next month, <a href=\"https:\/\/www.vice.com\/en\/article\/88qnag\/apple-announces-extreme-privacy-mode-for-targets-of-government-spyware\"><span>users will be able to turn on a new privacy mode that the company calls \u201cextreme.\u201d<\/span><\/a> It\u2019s made for journalists, activists, politicians, human rights defenders, and anyone else who may be worried about getting targeted by sophisticated hackers, perhaps working for governments armed with spyware made by companies such as NSO Group. Apple calls it \u201c<a href=\"https:\/\/www.apple.com\/newsroom\/2022\/07\/apple-expands-commitment-to-protect-users-from-mercenary-spyware\/\" target=\"_blank\" rel=\"noopener\"><span>Lockdown Mode<\/span><\/a>\u201d and it works by disabling some regular iPhone features that have been exploited to hack users in the past.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>But if users turn on Lockdown Mode, they will be easy to fingerprint and identify, according to a developer who created a proof of concept website that detects whether you have Lockdown Mode enabled or not.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>John Ozbay, the CEO of privacy focused company Cryptee, and a privacy activist, told Motherboard that any website or online ad can detect whether some regular features are missing, such as loading custom fonts, one of the features that Lockdown Mode disables.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>\u201cLet&#8217;s say you&#8217;re in China, and you&#8217;re using Lockdown Mode. Now, any website that you visit could effectively detect you are using Lockdown Mode, they have your IP address as well. So they will actually be able to identify that the user with this IP address is using Lockdown Mode,\u201d Ozbay said in a call. \u201cIt&#8217;s a tradeoff between security and privacy. [Apple] chose security.\u201d<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"11.142857142857\">\n<p><em><strong>Do you, or did you used to, work at Apple? We&#8217;d love to hear from you. Using a non-work phone or computer, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, Wickr\/Telegram\/Wire @lorenzofb, or email&nbsp;<a href=\"mailto:lorenzofb@vice.com\">lorenzofb@vice.com<\/a><\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>Ozbay said that there are several features that Lockdown Mode disables, and that websites could detect, but the lack of loading custom fonts is \u201cthe easiest thing to detect and exploit.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>\u201cIt took us five minutes to put the code together and see if this was working,\u201d he said.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>This issue, which is technically not a bug but just a specific drawback of how Lockdown Mode is designed, could paint a massive target on the back of users who are likely Apple&#8217;s most vulnerable users. There unfortunately may be no way around it.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>\u201cAs for fingerprinting, it\u2019s sadly a trade off we always have to deal with. The same is true of Tor and the Tor Browser\u2014they go to huge lengths to reduce any fingerprinting ability but you end up standing out because you\u2019re the one with less traceable fingerprints,\u201d Ryan Stortz, an independent security researcher who has studied iOS, told Motherboard.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28.872180451128\"><\/p>\n<p>Ozbay created <a href=\"https:\/\/beta.crypt.ee\/ios-lockdown-mode-test\" target=\"_blank\" rel=\"noopener\"><span>a proof-of-concept website<\/span><\/a> that detects whether the visitor is using Lockdown Mode. Motherboard verified it works by visiting the website with an iPhone without Lockdown Mode enabled, and asking Stortz, who has Lockdown Mode enabled, to visit the site.<\/p>\n<p><\/span><\/p>\n<div class=\"body-image\" data-component=\"ImageBlock\" readability=\"31\">\n<div class=\"body-image__img\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1661369518926-lockdown-on.jpeg?resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1661369518926-lockdown-on.jpeg?resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1661369518926-lockdown-on.jpeg?resize=20:*\"><img class=\"responsive-image__img\" alt=\"lockdown-on.jpeg\"><\/picture><\/div>\n<\/div>\n<div class=\"body-image__caption\" readability=\"32\">\n<p>A screenshot of the proof-of-concept website created by Ozbay. (Image: Motherboard)<\/p>\n<\/div>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33.741438356164\"><\/p>\n<p>Ozbay reached out to an Apple employee on Twitter and had a conversation with him about the issues he found. The employee, according to screenshots of their chat, told him that \u201cweb fonts are disabled intentionally to remove font parsing from available web attack surface,\u201d and that \u201cwatering hole attacks are part of our threat model, so I&#8217;m not sure it would make sense to have web font exceptions per site.\u201d (<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/watering-hole-attack\" target=\"_blank\" rel=\"noopener\"><span>Watering hole attacks<\/span><\/a> are exploits where hackers lure a victim to a known website where they injected malware, or a copycat of a known website that serves malware.)<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>In other words, there\u2019s nothing Apple can do right now to mitigate this issue without fundamentally changing how Lockdown Mode works.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p>Apple did not respond to a request for comment.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>Even if Apple doesn\u2019t make any changes, Stortz hopes that if enough people turn on Lockdown Mode, everyone will blend in and it will be harder to be identified as an interesting target.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>\u201cObviously you have to opt into Lockdown Mode and are sorta signaling that you think you\u2019re potentially of interest to a nation state attacker but Apple also made it painfully easy to turn on,\u201d he said. \u201cSo ideally you\u2019d be lost in the crowd of people who are more privacy conscious without the targeted spying concerns.\u201d&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"17.352112676056\"><\/p>\n<p><em><strong>Subscribe to our podcast,&nbsp;<a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\">CYBER<\/a>. Subscribe to&nbsp;<a href=\"https:\/\/www.twitch.tv\/motherboardtv\" target=\"_blank\" rel=\"noopener\">our new Twitch channel<\/a>.<\/strong><\/em><\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33771\/Websites-Can-Identify-If-Youre-Using-iPhones-New-Lockdown-Mode.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8250],"class_list":["post-48157","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlineprivacyphoneapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Websites Can Identify If You&#039;re Using iPhone&#039;s New Lockdown Mode 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Websites Can Identify If You&#039;re Using iPhone&#039;s New Lockdown Mode 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T15:10:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"432\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Websites Can Identify If You&#8217;re Using iPhone&#8217;s New Lockdown Mode\",\"datePublished\":\"2022-08-25T15:10:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\\\/\"},\"wordCount\":753,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"keywords\":[\"headline,privacy,phone,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\\\/\",\"name\":\"Websites Can Identify If You're Using iPhone's New Lockdown Mode 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"datePublished\":\"2022-08-25T15:10:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,phone,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyphoneapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Websites Can Identify If You&#8217;re Using iPhone&#8217;s New Lockdown Mode\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Websites Can Identify If You're Using iPhone's New Lockdown Mode 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/","og_locale":"en_US","og_type":"article","og_title":"Websites Can Identify If You're Using iPhone's New Lockdown Mode 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-25T15:10:52+00:00","og_image":[{"width":432,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Websites Can Identify If You&#8217;re Using iPhone&#8217;s New Lockdown Mode","datePublished":"2022-08-25T15:10:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/"},"wordCount":753,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"keywords":["headline,privacy,phone,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/","url":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/","name":"Websites Can Identify If You're Using iPhone's New Lockdown Mode 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"datePublished":"2022-08-25T15:10:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/websites-can-identify-if-youre-using-iphones-new-lockdown-mode\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,phone,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyphoneapple\/"},{"@type":"ListItem","position":3,"name":"Websites Can Identify If You&#8217;re Using iPhone&#8217;s New Lockdown Mode"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48157"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48157\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}