Overview
- Enabled by default, the protection ships on every iPhone 17 and iPhone Air powered by A19 or A19 Pro chips.
- Apple says the design pairs secure allocators with an Enhanced Memory Tagging Extension using 4‑bit secret tags and Tag Confidentiality Enforcement, with synchronous checks that crash on mismatch.
- Coverage spans the iOS kernel, more than 70 userland processes, and third‑party apps, with EMTE testing and integration available to developers in Xcode.
- Internal trials from 2020 to 2025 reportedly blocked many real‑world exploit chains, and Apple’s team could not reconstruct working chains after substitution attempts.
- Apple says dedicated silicon keeps performance impact negligible, and the default, system‑wide posture contrasts with Google’s opt‑in MTE on Pixel devices and Microsoft’s checks in Windows 11.