Apple, Meta and Google add lockdown modes against spyware attacks
Spyware protection is now a consumer safety issue, and Apple, Google and WhatsApp now offer lockdown-style settings that trade convenience for stronger defense.

Spyware protection is no longer a niche privacy concern. For journalists, activists, campaign staffers, election workers and public figures, it is becoming basic personal safety, and the big platform companies are finally building that reality into their devices and apps.
Why these lockdown modes matter
Apple, Google and Meta are all responding to the same problem: targeted attacks that do not look like ordinary hacking. These are the kinds of operations aimed at people who may be singled out for surveillance, intimidation or account takeover because of their job, their politics or their visibility. The people named by these companies tell the story clearly: journalists, activists, business leaders, IT admins, political campaign staffers, and people involved in elections.
That is why these tools are not meant as shiny consumer features. They are meant as emergency brakes. Each one tightens the normal experience in order to reduce the chances that a malicious link, attachment, download or account recovery step becomes an opening for spyware.
Apple’s Lockdown Mode is the most aggressive device-level option
Apple introduced Lockdown Mode in 2022 as an optional protection for iPhone, iPad and Mac. Apple says it is intended for the very small number of users who may be personally targeted by highly sophisticated digital threats, including mercenary spyware. In Apple’s own framing, it is not a general privacy upgrade. It is a hardening tool for people whose devices may be under active attention from well-funded attackers.
The trade-off is immediate. Apple says Lockdown Mode limits connectivity and reduces certain features, including message attachments and link previews from strangers. That makes everyday communication less frictionless, but it also shrinks the attack surface that spyware operators rely on. Apple has said it has not recorded a successful spyware attack against any device with Lockdown Mode enabled, which is the strongest argument for treating it as a serious safety measure rather than an optional tweak.
For people who fit the risk profile, the advice is straightforward: turn it on in the device’s security settings and accept that some convenience will disappear. For everyone else, the existence of Lockdown Mode is a reminder that the default security model on a phone is not built for people facing targeted espionage.
Google’s Advanced Protection is built for accounts under targeted attack
Google’s answer is the Advanced Protection Program, a defense layer for Google accounts that are likely to be singled out by attackers. Google recommends it for people at elevated risk of targeted online attacks, including journalists, activists, political campaign staffers, business leaders, IT admins and people involved in elections. Google launched the program in 2017, and by July to September 2019 it said it had sent more than 12,000 government-backed attack warnings to users around the world.
The structure of the program shows how account security changes when the threat is more serious. Google says Advanced Protection requires a security key and adds stronger protections around third-party app access, suspicious downloads and account recovery. In plain terms, that means a user gives up some convenience and flexibility so that a stolen password, a shady app or a manipulated recovery process is less likely to result in a takeover.
That matters because account compromise is often the easiest way into a person’s broader digital life. Email, cloud storage, calendars and messages can all be exposed if an attacker gets access to the main account. Advanced Protection is the closest thing Google offers to a hardened account mode for people who cannot afford ordinary security habits to fail.
What to turn on if your risk is high
If you are among the people most likely to be targeted, the pattern across Apple and Google is consistent: use the strongest mode available, and expect the experience to be stricter than default.
- On Apple devices, enable Lockdown Mode if you may be personally targeted by sophisticated spyware.
- For Google accounts, enroll in Advanced Protection and be prepared to use a security key.
- In WhatsApp, switch on Strict Account Settings if you need a more restrictive account posture against spyware and compromise.
Those settings are designed for different layers of the same problem. Apple hardens the device. Google hardens the account. WhatsApp hardens the messaging surface where a lot of modern surveillance and social engineering begins.
WhatsApp’s Strict Account Settings brings the same logic into messaging
Meta added Strict Account Settings on Jan. 27, 2026, describing it as a lockdown-style feature that further protects a WhatsApp account from highly sophisticated cyberattacks. WhatsApp says it is meant for people at risk, especially journalists and public figures, which places it in the same high-risk category as Apple’s Lockdown Mode and Google’s Advanced Protection.
That timing matters because spyware threats have not stayed abstract. WhatsApp has previously said it detected spyware campaigns targeting users including journalists and civil society members, and Reuters reported in 2025 that WhatsApp notified about 61 European journalists and civil society members that they had been targeted by Paragon Solutions’ Graphite spyware. The message from those cases is blunt: attackers are not only going after governments and intelligence targets. They are also going after the people documenting abuse, reporting on power and organizing public life.
Strict Account Settings follows the familiar lockdown logic. It is more restrictive by design, and that means some convenience is surrendered so the account is harder to abuse or silently compromise. For high-risk users, that trade is the point.
The real accountability test is whether these tools reach the people who need them
These features are important not because they make surveillance vanish, but because they acknowledge who bears the burden when spyware becomes normalized. Journalists, activists and election workers should not have to become security engineers to do their jobs, yet the protection now depends partly on whether they know these modes exist and are willing to live with the inconvenience.
That is the policy lesson underneath the product announcements. The companies can add lockdown modes, but the broader system still leaves too much responsibility on individuals facing powerful adversaries. Until stronger baseline protections are universal, these settings remain the most concrete defense many people have: a deliberate move from convenience toward safety, from ordinary defaults toward resistance, and from passive exposure toward active self-protection.
Know something we missed? Have a correction or additional information?
Submit a Tip

