Hot Take How Apple catches leakers


Thread author
Staff Member
Jan 8, 2011
… claiming that he had been forced to do so after Apple carried out a “multi-step sting” operation. Whether this is true, or just a face-saving story for getting things wrong, it is broadly consistent with what we know about how Apple catches leakers.

Apple has so many methods of identifying leakers – some of them incredibly subtle – that we and others have to be extremely careful in order to protect our source.
In terms of how Apple catches leakers, these are just some of the ways we know or suspect the company uses.
  • Invisible watermarks
  • Filenames
  • Serial numbers
  • Non-subtle typeface changes
  • Word or punctuation changes
  • False information

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.