🕷️ Crawler Inspector

URL Lookup

Direct Parameter Lookup

Raw Queries and Responses

1. Shard Calculation

Query:
Response:
Calculated Shard: 60 (from laksa083)

2. Crawled Status Check

Query:
Response:

3. Robots.txt Check

Query:
Response:

4. Spam/Ban Check

Query:
Response:

5. Seen Status Check

ℹ️ Skipped - page is already crawled

đź“„
INDEXABLE
âś…
CRAWLED
3 hours ago
🤖
ROBOTS ALLOWED

Page Info Filters

FilterStatusConditionDetails
HTTP statusPASSdownload_http_code = 200HTTP 200
Age cutoffPASSdownload_stamp > now() - 6 MONTH0 months ago
History dropPASSisNull(history_drop_reason)No drop reason
Spam/banPASSfh_dont_index != 1 AND ml_spam_score = 0ml_spam_score=0
CanonicalPASSmeta_canonical IS NULL OR = '' OR = src_unparsedNot set

Page Details

PropertyValue
URLhttps://daringfireball.net/2026/03/apple_enclaves_neo_camera_indicator
Last Crawled2026-04-08 13:52:08 (3 hours ago)
First Indexed2026-03-16 17:36:08 (22 days ago)
HTTP Status Code200
Meta TitleDaring Fireball: Apple Exclaves and the Secure Design of the MacBook Neo’s On-Screen Camera Indicator
Meta Descriptionnull
Meta Canonicalnull
Boilerpipe Text
Some camera-equipped Apple devices have dedicated camera indicator lights. E.g. recent MacBook Pros and MacBook Airs have them in the notch, next to the camera itself. The Studio Display has one in the bezel, next to its camera. Other devices — like iPhones and, now, the MacBook Neo — render a green indicator dot on the device’s display. One might presume that the dedicated indicator lights are significantly more secure than the rendered-on-display indicators. I myself made this presumption in the initial version of my MacBook Neo review last week. This presumption is, I believe, wrong. Later last week Apple published, and I linked to , a small update in their Platform Security Guide , which states: MacBook Neo combines system software and dedicated silicon elements within A18 Pro to provide additional security for the camera feed. The architecture is designed to prevent any untrusted software — even with root or kernel privileges in macOS — from engaging the camera without also visibly lighting the on-screen camera indicator light. The reason it’s tempting to think that a dedicated camera indicator light is more secure than an on-display indicator is the fact that hardware is generally more secure than software, because it’s harder to tamper with. With hardware, a dedicated hardware indicator light can be connected to the camera hardware such that if the camera is accessed, the light must turn on, with no way for software running on the device, no matter its privileges, to change that. With an indicator light that is rendered on the display, it’s not foolish to worry that malicious software, with sufficient privileges, could draw over the pixels on the display where the camera indicator is rendered, disguising that the camera is in use. If this were implemented simplistically, that concern would be completely valid. But Apple’s implementation of this is far from simplistic. Friend of the site and renowned developer and low-level-OS spelunker Guilherme Rambo texted me a note, which, with his permission, I’ll quote: Tidbit: the software-based camera indicator light in the MacBook Neo runs in the secure exclave¹ part of the chip, so it is almost as secure as the hardware indicator light. What that means in practice is that even a kernel-level exploit would not be able to turn on the camera without the light appearing on screen. It runs in a privileged environment separate from the kernel and blits the light directly onto the screen hardware. All of that applies to the mic indicator as well, which is a bonus compared to the camera-only hardware indicator. ¹ Exclaves run on a completely isolated realtime operating system that communicates with the kernel and userspace using a very limited API surface. Not to be confused with Secure Enclave, that’s a different thing. (That’s right, his text message had a footnote. Like I said, he’s a friend of the site. Also: blitting .) Exclave was the word I needed. Once I read that, it came back to me, and I recalled Random Augustine’s “On Apple Exclaves” , which I linked to almost exactly one year ago and described as “a splendidly nerdy but very approachable overview of the evolution of Apple’s XNU kernel over the last decade”. As Augustine documents, secure exclaves are something Apple had been building toward for a decade, but which only became enabled with the M4 and A18 generations of Apple Silicon. If you’re curious, I encourage you to read (or re-read) Augustine’s “On Apple Exclaves” , which should disabuse you of any concerns that these on-display camera indicators on the MacBook Neo and recent iPhone models are anything less than very secure designs.
Markdown
[![Daring Fireball](https://daringfireball.net/graphics/logos/)](https://daringfireball.net/ "Daring Fireball: Home") By **John Gruber** - [Archive](https://daringfireball.net/archive/ "Previous articles.") - [The Talk Show](https://daringfireball.net/thetalkshow/ "America’s favorite 3-star podcast.") - [Dithering](https://dithering.fm/ "Two episodes per week, 15 minutes per episode. Not a minute less, not a minute more.") - [Projects](https://daringfireball.net/projects/ "Software projects, including SmartyPants and Markdown.") - [Contact](https://daringfireball.net/contact/ "How to send email or feedback regarding Daring Fireball.") - [Colophon](https://daringfireball.net/colophon/ "About this site and the tools used to produce it.") - [Feeds / Social](https://daringfireball.net/feeds/) - [Sponsorship](https://daringfireball.net/feeds/sponsors/) [![Zed (Typotheque)](https://daringfireball.net/martini/images/zed-typotheque-2.png)](https://www.typotheque.com/blog/zed-a-sans-for-the-needs-of-21century/?utm_source=df) [Zed](https://www.typotheque.com/blog/zed-a-sans-for-the-needs-of-21century/?utm_source=df) — A font superfamily with extraordinary number of styles and extraordinary language support. # Apple Exclaves and the Secure Design of the MacBook Neo’s On-Screen Camera Indicator ###### Monday, 16 March 2026 Some camera-equipped Apple devices have dedicated camera indicator lights. E.g. recent MacBook Pros and MacBook Airs have them in the notch, next to the camera itself. The Studio Display has one in the bezel, next to its camera. Other devices — like iPhones and, now, the MacBook Neo — render a green indicator dot on the device’s display. One might presume that the dedicated indicator lights are significantly more secure than the rendered-on-display indicators. I myself made this presumption in the initial version of [my MacBook Neo review](https://daringfireball.net/2026/03/the_macbook_neo) last week. This presumption is, I believe, wrong. Later last week Apple published, and [I linked to](https://daringfireball.net/linked/2026/03/12/macbook-neo-on-screen-camera-indicator), a [small update in their Platform Security Guide](https://support.apple.com/guide/security/mac-on-screen-camera-indicator-light-sec75a2d237d/1/web/1), which states: > MacBook Neo combines system software and dedicated silicon elements within A18 Pro to provide additional security for the camera feed. The architecture is designed to prevent any untrusted software — even with root or kernel privileges in macOS — from engaging the camera without also visibly lighting the on-screen camera indicator light. The reason it’s tempting to think that a dedicated camera indicator light is more secure than an on-display indicator is the fact that hardware is generally more secure than software, because it’s harder to tamper with. With hardware, a dedicated hardware indicator light can be connected to the camera hardware such that if the camera is accessed, the light must turn on, with no way for software running on the device, no matter its privileges, to change that. With an indicator light that is rendered on the display, it’s not foolish to worry that malicious software, with sufficient privileges, could draw over the pixels on the display where the camera indicator is rendered, disguising that the camera is in use. If this were implemented simplistically, that concern would be completely valid. But Apple’s implementation of this is far from simplistic. [Friend of the site](https://daringfireball.net/search/Guilherme+Rambo) and renowned developer and low-level-OS spelunker [Guilherme Rambo](https://www.rambo.codes/) texted me a note, which, with his permission, I’ll quote: > Tidbit: the software-based camera indicator light in the MacBook Neo runs in the secure exclave¹ part of the chip, so it is almost as secure as the hardware indicator light. What that means in practice is that even a kernel-level exploit would not be able to turn on the camera without the light appearing on screen. It runs in a privileged environment separate from the kernel and blits the light directly onto the screen hardware. All of that applies to the mic indicator as well, which is a bonus compared to the camera-only hardware indicator. > > ¹ Exclaves run on a completely isolated realtime operating system that communicates with the kernel and userspace using a very limited API surface. Not to be confused with Secure Enclave, that’s a different thing. (That’s right, his text message had a footnote. Like I said, he’s a friend of the site. Also: [blitting](https://en.wiktionary.org/wiki/blit).) *Exclave* was the word I needed. Once I read that, it came back to me, and I recalled [Random Augustine’s “On Apple Exclaves”](https://randomaugustine.medium.com/on-apple-exclaves-d683a2c37194), which I [linked to almost exactly one year ago](https://daringfireball.net/linked/2025/03/19/on-apple-exclaves) and described as “a splendidly nerdy but very approachable overview of the evolution of Apple’s XNU kernel over the last decade”. As Augustine documents, secure exclaves are something Apple had been building toward for a decade, but which only became enabled with the M4 and A18 generations of Apple Silicon. If you’re curious, I encourage you to read (or re-read) [Augustine’s “On Apple Exclaves”](https://randomaugustine.medium.com/on-apple-exclaves-d683a2c37194), which should disabuse you of any concerns that these on-display camera indicators on the MacBook Neo and recent iPhone models are anything less than *very* secure designs. | | | |---|---| | **Previous:** | [Modifier Key Order for Keyboard Shortcuts](https://daringfireball.net/2026/03/modifier_key_order_for_keyboard_shortcuts) | | **Next:** | [Squashing](https://daringfireball.net/2026/03/squashing) | [Display Preferences](https://daringfireball.net/preferences/ "Customize the font size and presentation options for this web site.") Copyright © 2002–2026 The Daring Fireball Company LLC.
Readable Markdown
Some camera-equipped Apple devices have dedicated camera indicator lights. E.g. recent MacBook Pros and MacBook Airs have them in the notch, next to the camera itself. The Studio Display has one in the bezel, next to its camera. Other devices — like iPhones and, now, the MacBook Neo — render a green indicator dot on the device’s display. One might presume that the dedicated indicator lights are significantly more secure than the rendered-on-display indicators. I myself made this presumption in the initial version of [my MacBook Neo review](https://daringfireball.net/2026/03/the_macbook_neo) last week. This presumption is, I believe, wrong. Later last week Apple published, and [I linked to](https://daringfireball.net/linked/2026/03/12/macbook-neo-on-screen-camera-indicator), a [small update in their Platform Security Guide](https://support.apple.com/guide/security/mac-on-screen-camera-indicator-light-sec75a2d237d/1/web/1), which states: > MacBook Neo combines system software and dedicated silicon elements within A18 Pro to provide additional security for the camera feed. The architecture is designed to prevent any untrusted software — even with root or kernel privileges in macOS — from engaging the camera without also visibly lighting the on-screen camera indicator light. The reason it’s tempting to think that a dedicated camera indicator light is more secure than an on-display indicator is the fact that hardware is generally more secure than software, because it’s harder to tamper with. With hardware, a dedicated hardware indicator light can be connected to the camera hardware such that if the camera is accessed, the light must turn on, with no way for software running on the device, no matter its privileges, to change that. With an indicator light that is rendered on the display, it’s not foolish to worry that malicious software, with sufficient privileges, could draw over the pixels on the display where the camera indicator is rendered, disguising that the camera is in use. If this were implemented simplistically, that concern would be completely valid. But Apple’s implementation of this is far from simplistic. [Friend of the site](https://daringfireball.net/search/Guilherme+Rambo) and renowned developer and low-level-OS spelunker [Guilherme Rambo](https://www.rambo.codes/) texted me a note, which, with his permission, I’ll quote: > Tidbit: the software-based camera indicator light in the MacBook Neo runs in the secure exclave¹ part of the chip, so it is almost as secure as the hardware indicator light. What that means in practice is that even a kernel-level exploit would not be able to turn on the camera without the light appearing on screen. It runs in a privileged environment separate from the kernel and blits the light directly onto the screen hardware. All of that applies to the mic indicator as well, which is a bonus compared to the camera-only hardware indicator. > > ¹ Exclaves run on a completely isolated realtime operating system that communicates with the kernel and userspace using a very limited API surface. Not to be confused with Secure Enclave, that’s a different thing. (That’s right, his text message had a footnote. Like I said, he’s a friend of the site. Also: [blitting](https://en.wiktionary.org/wiki/blit).) *Exclave* was the word I needed. Once I read that, it came back to me, and I recalled [Random Augustine’s “On Apple Exclaves”](https://randomaugustine.medium.com/on-apple-exclaves-d683a2c37194), which I [linked to almost exactly one year ago](https://daringfireball.net/linked/2025/03/19/on-apple-exclaves) and described as “a splendidly nerdy but very approachable overview of the evolution of Apple’s XNU kernel over the last decade”. As Augustine documents, secure exclaves are something Apple had been building toward for a decade, but which only became enabled with the M4 and A18 generations of Apple Silicon. If you’re curious, I encourage you to read (or re-read) [Augustine’s “On Apple Exclaves”](https://randomaugustine.medium.com/on-apple-exclaves-d683a2c37194), which should disabuse you of any concerns that these on-display camera indicators on the MacBook Neo and recent iPhone models are anything less than *very* secure designs.
Shard60 (laksa)
Root Hash12751313472477909660
Unparsed URLnet,daringfireball!/2026/03/apple_enclaves_neo_camera_indicator s443