Responding to a comment by bn-l, but also to the general sentiment about Apple and untrusted code I often see on hacker news.<p>> The broader consumer base will install anything a bad actor wants them to and then blame the manufacturer for not stopping them with some draconian rule.<p>Has this even happened? Has anyone ever sued and won the case with a laptop manufacturer (or Microsoft or Apple), because they downloaded and executed an executable with malware on their computer? Do average people really blame Microsoft for malware?
I would kind of agree that they should, but not because Microsoft allows people to run untrusted code, but because the security model of Windows (and other PC operating systems) is still bad. But not because it allows people to run unsigned code.<p>Don't get me wrong, I don't think we should return to security model of old operating systems - smartphone OSes definitely got that right, except for the part that forces users to give up control of their devices. It's just that the argument, that allowing people to install software not signed by Apple on their own devices would make iPhones insecure, is totally unsubstantiated to me.<p>I see some people still arguing that (ex. older) people will do what they are told and will install shady software. If Apple really cares, they could provide a switch that allows users to disable installing "unverified" software. Maybe ask about it during setup. Maybe allow locking it until factory reset, or allow head of icloud family to control it. There are many options to keep some people secure from all unverified apps, while allowing others to run them.
Not to mention that the idea that all apps not signed by Apple are somehow malicious is just bad. You could have other entities than Apple verify code.
Currently, even running apps you yourself wrote, on your own hardware, is hard and limited. For no good reason.<p>The only reason Apple is blocking other stores, or preventing people from installing homebrew, is to collect more money. It's good that they are investing into security of their software and hardware, but in this particular case, security is used only as a distraction.