Home Tech NATO approves the iPhone and iPad for classified use

NATO approves the iPhone and iPad for classified use

Apple’s mobile devices are secure enough for NATO. Following extensive testing by the German government, the iPhone and iPad are now considered secure enough for the NATO-restricted classified level.

Germany’s Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, or BSI) tested the devices. BSI first approved the iPhone and iPad for governmental use by German authorities in 2022. To take the additional step of NATO approval, Apple says BSI conducted exhaustive technical assessments, comprehensive testing and deep security analysis.

Unless you work for NATO, this won’t mean a thing to you. But at least it appears to bolster some of Apple’s marketing claims about security. (As for its privacy claims, well, that depends on which kind you mean.) Apple’s press release emphasized that these are the first consumer devices to receive the certification, and they did so without any special software or settings. It applies to iPhones and iPads running iOS 26.

“Secure digital transformation is only successful if information security is considered from the beginning in the development of mobile products,” BSI president Claudia Plattner is quoted as saying in Apple’s press release. “Expanding on BSI’s rigorous audit of iOS and iPadOS platform and device security for use in classified German information environments, we are pleased to confirm the compliance under NATO nations’ assurance requirements.”

This article originally appeared on Engadget at https://www.engadget.com/mobile/nato-approves-the-iphone-and-ipad-for-classified-use-200857276.html?src=rss

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Google paid startup Form Energy $1B for its massive 100-hour battery

The deal paves the way for Form Energy to raise a new...

This AI Agent Is Designed to Not Go Rogue

The new open source project IronCurtain uses a unique method to secure...

Linux explores new way of authenticating developers and their code – here’s how it works

Linux kernel maintainers propose a less painful process for identifying developers. See...

Why scammers call you and say nothing – and how to respond safely

There’s a reason scammers don’t say anything when they call you, at...