In the beginning, Apple products stood high, wide, and handsome in the face of cyberattacks. Average hackers found it nearly impossible to crack the company’s proprietary software, and an Apple product’s attack surface was almost nonexistent. But over the years, those attack surfaces got bigger, and hackers and their tools became more sophisticated. The hackers’ holy grail has always been the iPhone because most users live their lives on that useful little device, and most keep their sensitive data stored within its Apple-branded hardware.