www.independent.co.uk Open in urlscan Pro
2a04:4e42:200::347  Public Scan

Submitted URL: https://go.mobilegrowth.org/MgNwq7R?m=email
Effective URL: https://www.independent.co.uk/tech/iphone-apple-security-software-lockdown-mode-b2450192.html?utm_campaign=Mobile-Growth-News&...
Submission: On December 15 via api from ES — Scanned from ES

Form analysis 2 forms found in the DOM

POST

<form id="reg-lite-form" class="reg-form i-amphtml-form" target="_top" method="post" action-xhr="/internal-api/newsletter-component/submit/lite" verify-xhr="/internal-api/newsletter-component/verify" custom-validation-reporting="interact-and-submit"
  on="valid:AMP.setState({liteRegValid: true});invalid:AMP.setState({liteRegValid: false});submit-success:AMP.setState({ success: true })" novalidate="">
  <div [hidden]="success">
    <div class="sc-1vqdyfr-1 jvUXfj"><input class="newsletter-key" name="newsletters" type="hidden" readonly="" value="receiveTech"><input name="regSourceNewsletter" type="hidden" readonly="" value="IND_Tech_Newsletter"><input name="regSourceSection"
        type="hidden" readonly="" value="Tech"><input name="regSourceMethod" type="hidden" readonly="" value="Article%2BSignpost">
      <div class="sc-lqqm6o-0 fGXRWm"><input type="text" id="reg-lite--form-email" name="_" class="not-logged-input is-pristine is-untouched"
          pattern="^(?=(.{1,64}@.{1,255}))([!#$%&amp;amp;'*+\-\/=?\^_`{|}~a-zA-Z0-9}]{1,64}(\.[!#$%&amp;amp;'*+\-\/=?\^_`{|}~a-zA-Z0-9]{0,}){0,})@((\[(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)){3}\])|([a-zA-Z0-9-]{1,63}(\.[a-zA-Z0-9-]{2,63}){1,}))$"
          required="" aria-controls="reg-lite--form-email-helper-text" aria-describedby="reg-lite--form-email-helper-text" placeholder="Email" value=""><label for="reg-lite--form-email"></label>
        <div class="error-text" visible-when-invalid="valueMissing" validation-for="reg-lite--form-email">Please enter a valid email address</div>
        <div class="error-text" visible-when-invalid="patternMismatch" validation-for="reg-lite--form-email">Please enter a valid email address</div>
        <div class="error-text" visible-when-invalid="customError" validation-for="reg-lite--form-email"></div>
      </div>
      <div class="sc-hav996-0 iLWXCF sc-hav996-3 sc-1vqdyfr-2 hhxIHL erPmpm signup-btn lite-registration-submit form-submit"><button class="sc-hav996-2 kdEnJj form-submit" name="submitBtn" type="submit" disabled="" [disabled]="!liteRegValid"><span
            class="btn-text">SIGN UP</span><span class="sc-hav996-1 eisLsa btn-loader"></span></button></div>
    </div>
    <div class="sc-76suco-1 AGjIr newsletter__checkbox sc-1vqdyfr-3 hftFFP" data-nosnippet=""><input type="checkbox" id="newsletter-checkbox" name="newsletters" value="receiveIndyOffers"><label for="newsletter-checkbox"
        class="sc-76suco-0 kNWyzQ checkmark">I would like to be emailed about offers, events and updates from The Independent. Read our&nbsp;<a target="_blank" rel="noreferrer" href="/service/privacy-policy-a6184181.html">privacy notice</a></label>
    </div>
  </div><input type="hidden" name="^" data-action="signUpNewsletters">
  <div submit-success="true"><template type="amp-mustache">
      <div class="sc-1i5cmds-0 jRprwJ">
        <h2 data-nosnippet="" class="sc-1i5cmds-1 dpLFXq">Thanks for signing up to the<br> <!-- -->IndyTech<!-- --> email</h2>
      </div>
    </template></div>
  <div submit-error="true" data-nosnippet=""><template type="amp-mustache">
      <div class="sc-19svp5f-0 fVbCOD">{{ #verifyErrors }}<!-- -->{{ message }}<!-- -->{{ /verifyErrors }}<!-- -->{{ ^verifyErrors }}<!-- -->Something went wrong. Please try again later<!-- -->{{ /verifyErrors }}</div>
    </template></div>
</form>

POST

<form id="login-form" class="login-form i-amphtml-form" method="post" target="_top" action-xhr="/internal-api/user/login/commenting/submit" verify-xhr="/internal-api/user/login/verify" custom-validation-reporting="interact-and-submit"
  on="valid:AMP.setState({loginDisabled: false});invalid:AMP.setState({loginDisabled: true})" novalidate=""><input type="hidden" name="returnUrl" value="/tech/iphone-apple-security-software-lockdown-mode-b2450192.html">
  <p class="sc-1wvnxd-5 dBoqta">Log in</p>
  <div class="sc-1wvnxd-13 bMZnQy">
    <div class="sc-lqqm6o-0 fGXRWm"><input type="text" id="login-form-email" name="-" class="is-pristine is-untouched" required="" aria-controls="login-form-email-helper-text" aria-describedby="login-form-email-helper-text"
        placeholder="Enter your email"><label for="login-form-email">Email address</label>
      <div class="error-text" visible-when-invalid="customError" validation-for="login-form-email"></div>
    </div>
  </div>
  <div class="sc-1wvnxd-13 bMZnQy">
    <div class="sc-lqqm6o-0 fGXRWm"><input type="password" id="login-form-password" name="password" class="sc-1wvnxd-8 gkuHjv input-password js-hideshowpassword is-pristine is-untouched" required="" aria-controls="login-form-password-helper-text"
        aria-describedby="login-form-password-helper-text" placeholder="Enter your password"><label for="login-form-password">Password</label>
      <div class="error-text" visible-when-invalid="customError" validation-for="login-form-password"></div>
    </div>
  </div>
  <div class="form-errors" submit-error="true">Email and password don't match</div>
  <div class="sc-hav996-0 iLWXCF sc-hav996-3 sc-1wvnxd-10 hhxIHL kClGCn"><button class="sc-hav996-2 kdEnJj form-submit" name="submitBtn" type="submit" disabled="" [disabled]="loginDisabled"><span class="btn-text">Submit</span><span
        class="sc-hav996-1 eisLsa btn-loader"></span></button></div>
  <div class="sc-1wvnxd-2 hlTTuG"><a href="/forgotten-password" class="sc-1wvnxd-3 dujZar">Forgotten your password?</a></div>
  <div class="sc-1wvnxd-11 eJNivV"></div>
  <p class="sc-1wvnxd-6 dmsJSj">New to The Independent?</p><a id="registerLink" href="/register" class="sc-1wvnxd-9 hDFQdg">Register</a>
</form>

Text Content

Jump to content

UK EDITIONCHANGE

US EditionAsia EditionEdición en Español
Sign up to our newslettersSubscribe now
{{indy.truncatedName}}
Log in / Register
Black Friday 2023Jet2holidays
SubscribeMenu

 * News
   * News
   * UK
   * US
   * World
   * UK Politics
   * Brexit
   * Health
   * Business
   * Science
   * Space
   * News Videos
 * Sport
   * Sport
   * Football
   * Formula 1
   * Rugby Union
   * Cricket
   * Tennis
   * Boxing
   * UFC
   * Cycling
   * Golf
   * Betting
   * Sport Videos
 * Voices
   * Voices
   * Editorials
   * Letters
   * Tom Peck
   * John Rentoul
   * Mary Dejevsky
   * Andrew Grice
   * Marie Le Conte
   * Sean O’Grady
 * Culture
   * Culture
   * Film
   * TV & Radio
   * Music
   * Games
   * Books
   * Art
   * Photography
   * Theatre & Dance
   * Culture Videos
 * Lifestyle
   * Lifestyle
   * Shopping
   * Tech
   * Money
   * Food & Drink
   * Fashion
   * Love & Sex
   * Women
   * Health & Families
   * Royal Family
   * Motoring
   * Electric Vehicles
   * Lifestyle Videos
 * Travel
   * Travel
   * UK Hotel Reviews
   * News & Advice
   * Simon Calder
   * Cruises
   * UK
   * Europe
   * USA
   * Asia
   * Australia & New Zealand
   * South America
   * C. America & Caribbean
   * Middle East
 * Premium
   * Premium
   * Editorials
   * Voices
   * Long Reads
   * Politics Explained
   * News Analysis
   * Today’s Edition

More
Best
 * Advisor
 * Home & Garden
 * Tech
 * Fashion & Beauty
 * Food & Drink
 * Kids
 * Books
 * Travel & Outdoors
 * Sports & Fitness
 * Deals

Climate
 * News
 * Voices
 * Sustainable Living
 * Explained
 * Climate Videos
 * Electric Vehicles
 * SGI

TV
 * Behind The Headlines
 * On The Ground
 * Decomplicated
 * You Ask The Questions
 * Binge Watch
 * Music Box
 * Love Lives
 * Travel Smart
 * Watch on your TV

 * Today’s Edition
 * Crosswords & Puzzles
 * Most Commented
 * Newsletters
 * Ask Me Anything
 * Virtual Events
 * Betting Sites
 * Online Casinos
 * Vouchers
 * Indy100


THANK YOU FOR REGISTERING

Please refresh the page or navigate to another page on the site to be
automatically logged inPlease refresh your browser to be logged in


Tech


WHY APPLE IS WORKING HARD TO BREAK INTO ITS OWN IPHONES

IN A SECRET LOCATION IN PARIS, APPLE HAS HIRED AN ELITE TEAM OF LASER-WIELDING
HACKERS TO TRY AND CRACK ITS IPHONES. ANDREW GRIFFIN GETS AN INSIDE LOOK


Monday 20 November 2023 03:57
Comments

ARTICLE BOOKMARKED

Find your bookmarks in your Independent Premium section, under my profile

Don't show me this message again
✕


Apple's labs in Paris use advanced hardware techniques to challenge the security
of its devices

(Apple)


SIGN UP TO OUR FREE WEEKLY INDYTECH NEWSLETTER DELIVERED STRAIGHT TO YOUR INBOX


SIGN UP TO OUR FREE INDYTECH NEWSLETTER


Please enter a valid email address
Please enter a valid email address

SIGN UP
I would like to be emailed about offers, events and updates from The
Independent. Read our privacy notice


THANKS FOR SIGNING UP TO THE
INDYTECH EMAIL

{{ #verifyErrors }}{{ message }}{{ /verifyErrors }}{{ ^verifyErrors }}Something
went wrong. Please try again later{{ /verifyErrors }}

Last summer, Apple’s iPhones got a new feature that it hopes you never need to
use and which mostly makes them harder to use. Named Lockdown Mode, Apple
stresses that it is not for everyone, calling it an “optional, extreme
protection” aimed at “very few individuals” that will be irrelevant to most
people.

Many people will never know that the feature exists. But it is just one part of
a range of features that Apple and other companies have been forced to add to
their devices as phones and other personal devices become an increasingly
important part of geopolitics. Lockdown Mode is just one part of Apple’s
response: it sits alongside other security features as well as detailed security
work that aims to stop people breaking into its devices.




That work has largely been done quietly, with Apple focusing much more on its
privacy work than on security. But recently it opened up on some of that work,
as well as the thinking that led Apple to put so much focus onto a set of
features that nobody ever wants to use.




Apple’s team of security engineers deploy attacks on its hardware before
products are available to customers

(Apple)

Some of that work is happening now in Paris. The city has a long history of work
on security technology – including work on smart cards that saw the early
widespread introduction of secure debit cards in France – but the activity at
Apple’s facilities in the city is looking far ahead, towards iPhones and other
devices that are secret for now and will not appear for years.



As part of that work in Paris, Apple’s engineers are working hard to break its
phones. Using a vast array of technology including lasers are finely tuned
sensors, they are trying to find gaps in their security and patch them up before
they even arrive in the world.

Unlike with software, where even significant security holes can be fixed
relatively simply with a security update, hardware is out of Apple’s hands once
a customer buys it. That means that it must be tested years in advance with
every possible weakness probed and fixed up before the chip even makes it
anywhere near production.



Apple’s chips have to be relied upon to encrypt secure data so that it cannot be
read by anyone else, for instance; pictures need to be scrambled before they are
sent up to be backed up on iCloud, for instance, to ensure that an attacker
could not grab them as they are transferred. That requires using detailed and
complicated mathematical work to make the pictures meaningless without the
encryption key that will unlock them.

There are various ways that process might be broken, however. The actual chip
doing the encryption can show signs of what it is doing: while processors might
seem like abstract electronics, they throw out all sorts of heats and signals
that could be useful to an attacker. If you asked someone to keep a secret
number in their head and let you try and guess it, for instance, you might tell
them to multiply the number by two and see how long it takes and how hard they
are thinking; if it’s a long time, it suggests the number might be especially
big. the same principle is true of a chip, it’s just that the signs are a little
different.



Apple's labs in Paris use advanced hardware techniques to challenge the security
of its devices

(Apple)

And so Apple gets those chips and probes them, blasts them with precisely
targeted lasers, heats them up and cools them down, and much more besides. The
engineers in its Paris facilities doing this work are perhaps the most highly
capable and well resourced hackers of Apple’s products in the world; they just
happen to be doing it to stop everyone else doing the same. If they find
something, that information will be distributed to colleagues who will then work
to patch it up. Then the cycle starts all over again.



It is complicated and expensive work. But they are up against highly compensated
hackers: in recent years, there has grown up to be an advanced set of companies
offering cyber weapons to the highest bidder, primarily for use against people
working to better the world: human rights activists, journalists, diplomats. No
piece of software better exemplifies the vast resources that are spent in this
shadow industry than Pegasus, a highly targeted piece of spyware that is used to
hack phones and surveil their users, though it has a host of competitors.



An Israeli woman uses her iPhone in front of the building housing the Israeli
NSO group, on August 28, 2016

(AFP via Getty Images)

Pegasus has been around since at least 2016, and since then Apple has been
involved in a long and complicated game of trying to shut down to the holes it
might exploit before attackers find and market another one. Just as with other
technology companies, Apple works to secure devices against more traditional
attacks, such as stolen passwords and false websites. But Pegasus is an entirely
different kind of threat, targeted at specific people and so expensive that it
would only be used in high-grade attacks. Fighting it means matching its
complexity.



It’s from that kind of threat that Lockdown Mode was born, though Apple does not
explicitly name Pegasus in its materials. It works by switching off parts of the
system, which means that users are explicitly warned when switching it on that
they should only do so with good reason, since it severely restricts the way the
phone works; FaceTime calls from strangers will be blocked, for instance, and so
will most message attachments.

But Lockdown Mode is not alone. Recent years have seen Apple increase the
rewards in its bug bounty programme, through which it pays security researchers
for finding bugs in its software, after it faced sustained criticism over its
relatively small payouts. And work on hardware technologies such as encryption
– and testing it in facilities such as those in Paris – mean that Apple is
attempting to build a phone that is safe from attacks in both hardware and
software.



Apple’s security labs take extreme steps to test the security of its products,
including the use of lasers

(Apple)

Apple says that work is succeeding, believing it is years ahead of its hackers
and proud of the fact that it has held off attacks without forcing its users to
work harder to secure their devices or compromising on features. But recent
years have also seen it locked in an escalating battle: Lockdown Mode might have
been a breakthrough of which it is proud, but it was only needed because of an
unfortunate campaign to break into people’s phones. Ivan Krstić, Apple’s head of
security engineering and architecture, says that is partly just a consequence of
the increasing proliferation of technology.



“I think what’s happening is that that there are more and more avenues of
attack. And that’s partly a function of wider and wider deployment of
technology. More and more technology is being used in more and more scenarios.,”
says Krstić, pointing not only to personal devices such as phones but also to
industry and critical infrastructure. “That is creating more opportunity for
more attackers to come forward to develop some expertise to pick a niche that
they want to spend their time attacking.

“There was a time that that I still well remember when data breaches were
seemingly not a wide problem. But of course, they have exploded over the last 10
years or so – more than tripled, between 2013 and 2021. In 2021, the number of
personal records breached 1.1 billion personal records.



“During the same amount of time a number of other attackers have been pursuing
new kinds of attack, or different kinds of attacks – against devices, against
Internet of Things devices, against really anything that is that is connected in
in some way to the internet.

“And I think in a lot of these cases, attackers were will go where there is
money to be made or some other benefits to be obtained and the nature of the
fight for security is to keep pushing the defences forward to keep trying to
stay one step ahead of not just where the attacks are today, but also where
they’re going.”

Apple doesn’t reveal exactly how much of its money is spent on security work.
But it must be significant, both in terms of raw money as well as the extra
thought and design required on any given device. What’s the justification for
investing so many resources on ensuring that a very small number of people are
protected from the most advanced attacks?

“There are two,” says Krstić. “One is that attacks that are the most
sophisticated attacks today may over time start to percolate down and become
more widely available. Being able to understand what the absolute most
sophisticated most grave threats look like today lets us build defences before
any of that has a chance to percolate down and become more widely available. But
I think that’s the smaller of the two reasons.



“When we look at how some of this state grade mercenary spyware is being abused,
the kinds of people being hit with it – it’s journalists, diplomats, people
fighting to make the world a better place. And we think it’s wrong for this kind
of spyware to be abused in this way. We think that that those users deserve
trustworthy, safe technology, and the ability to communicate safely and freely,
just as all our other users.

“So this was, for us, not a business decision. It was… doing what’s right.”

Apple’s focus on security places it into a difficult geopolitical situation of
the kind it has often studiously avoided. Late last month, for instance, Indian
opposition leaders started receiving threat notifications warning them that
their devices might be attacked. Neither the notifications or Apple more
generally named who was doing it, and Apple says that the warnings could be a
false alarm – but nonetheless the Indian government pushed back, launching a
probe of the security of Apple’s devices.

It is not the kind of difficulty that comes even with other security work; those
stealing passwords or scamming people out of money don’t have lobbyists and
government power. The kind of highly targeted, advanced attacks that Lockdown
Mode and other features guard against however are costly and complicated,
meaning they will often be done by governments that could cause difficulties for
Apple and other technology companies. How is Apple guided in situations where it
could potentially be up against governments and other powerful agencies?

“We do not see ourselves as set against governments,” says Krstić. “That is not
what any of this work is about. But we do see ourselves as having a duty to
defend our users from threats, whether common or in some cases, truly grave.



iPhones are on display inside the new Apple retail store during a media preview
on the eve of its opening in Mumbai on April 17, 2023

(AFP via Getty Images)

He declines to give precise details about how the company has dealt with those
difficulties in the past. “But I think when you look at what’s been driving it,
when you look at these cases that I’ve pointed to and when you look at what the
response has been to the defences we built and how we’ve been able to protect
some of these users, we feel very strongly like we’re doing the right thing.”



Threat notifications are not the only part of Apple’s security work that have
caused issues with authorities. Another much larger debate is coming, and might
potentially bring a much more substantial change.

The European Union’s recently signed Digital Markets Act requires that what it
calls gatekeepers – Apple and other operators of app stores – must allow for
sideloading, or letting people put apps on their phones from outside of those
App Stores. At the moment, iPhones can only download and run apps downloaded
from the official store; Apple says that is an important protection, but critics
argue that it gives it too much power over the device.

The introduction of sideloading is just one of the many controversial parts of
the Digital Markets Act. But if it goes through as planned, the company will be
forced to let people head to a website and download a third-party app, without
standing in the way. The European Commission has made very clear that it
believes that is required for fair competition, and that it thinks that will
give users more choice about what apps they use and how they get them.

Krstić does not agree, and Apple has been explicit in its opposition to
sideloading. The idea that people are being given an extra choice – including
the choice of sticking with the App Store and keeping its protections – is a
false one, he says with some frustration.



“That’s a great misunderstanding – and one we have tried to explain over and
over. The reality of what the alternative distribution requirements enable is
that software that users in Europe need to use – sometimes business software,
other times personal software, social software, things that they want to use –
may only be available outside of the store, alternatively distributed.



“In that case, those users don’t have a choice to get that software from a
distribution mechanism that they trust. And so, in fact, it is simply not the
case that users will retain the choice they have today to get all of their
software from the App Store.”




MORE ABOUT

AppleiPhone


JOIN OUR COMMENTING FORUM

Join thought-provoking conversations, follow other Independent readers and see
their replies

Comments


1/6WHY APPLE IS WORKING HARD TO BREAK INTO ITS OWN IPHONES


WHY APPLE IS WORKING HARD TO BREAK INTO ITS OWN IPHONES

Apple’s team of security engineers deploy attacks on its hardware before
products are available to customers

Apple


WHY APPLE IS WORKING HARD TO BREAK INTO ITS OWN IPHONES

Apple's labs in Paris use advanced hardware techniques to challenge the security
of its devices

Apple


WHY APPLE IS WORKING HARD TO BREAK INTO ITS OWN IPHONES

An Israeli woman uses her iPhone in front of the building housing the Israeli
NSO group, on August 28, 2016

AFP via Getty Images


WHY APPLE IS WORKING HARD TO BREAK INTO ITS OWN IPHONES

Apple’s security labs take extreme steps to test the security of its products,
including the use of lasers

Apple


WHY APPLE IS WORKING HARD TO BREAK INTO ITS OWN IPHONES

iPhones are on display inside the new Apple retail store during a media preview
on the eve of its opening in Mumbai on April 17, 2023

AFP via Getty Images


WHY APPLE IS WORKING HARD TO BREAK INTO ITS OWN IPHONES

Apple's labs in Paris use advanced hardware techniques to challenge the security
of its devices

Apple




















✕


SUBSCRIBE TO INDEPENDENT PREMIUM TO BOOKMARK THIS ARTICLE

Want to bookmark your favourite articles and stories to read or reference later?
Start your Independent Premium subscription today.

Subscribe
Already subscribed? Log in


MOST POPULAR

Body found in search for missing Norwich mother
Jamie Raskin blows up the House GOP’s Biden impeachment fantasy
The UK city voted prettier than Venice
Prince Harry attacks Mirror’s ‘vendetta journalism’ – live
Oldham teen ‘abducted by mother’ to return to UK within days - live


POPULAR VIDEOS

Sky News forced off air and presenters evacuated during live broadcast
King Charles visits High Court ahead of Harry’s hacking claim outcome
Strictly’s Craig Revel Horwood addresses Bruno Tonioli return rumours

Donald Trump is now comparing himself to Obama in a bizarre boast
6-million-year old treasure trove discovered deep beneath mountain range
Mystifying underwater 'city' discovered off the coast of Greece
Cristiano Ronaldo investing $40m of his own money into football game challenging
EA
Taylor Swift fans can't believe the amount of celebrities in her birthday party
photo




SPONSORED FEATURES

Body found in search for missing Norwich mother
Jamie Raskin blows up the House GOP’s Biden impeachment fantasy
Prince Harry attacks Mirror’s ‘vendetta journalism’ – live
Oldham teen ‘abducted by mother’ to return to UK within days - live
Kanye West ‘announces new album release date’ after latest controversy


 * Get in touch
   * Contact us
   * 
 * Our Products
   * Subscribe
   * Register
   * Newsletters
   * Today’s Edition
   * Install our app
   * Archive
 * Other publications
   * International editions
   * Independent en Español
   * Independent Arabia
   * Independent Turkish
   * Independent Persian
   * Independent Urdu
   * Evening Standard
 * Extras
   * Advisor
   * Puzzles
   * All topics
   * Betting
   * Voucher codes
   * Competitions and offers
   * Independent Advertising
   * Independent Ignite
   * Syndication
   * Working at The Independent
 * Legal
   * Code of conduct and complaints
   * Contributors
   * Cookie policy
   * Privacy notice
   * Privacy settings
   * User policies
   * Modern Slavery Act




THANK YOU FOR REGISTERING

Please refresh the page or navigate to another page on the site to be
automatically logged inPlease refresh your browser to be logged in

Close

UK EDITIONCHANGE

US EditionAsia EditionEdición en Español
Subscribe
{{indy.truncatedName}}
Log in / Register

Black Friday 2023Jet2holidays
{{#items}}


{{#STAMPSMALL}}{{/STAMPSMALL}}{{#STAMPCLIMATE}}{{/STAMPCLIMATE}}{{#STAMPPREMIUM}}{{/STAMPPREMIUM}}{{TITLE}}{{#DESC}}{{DESC}}{{/DESC}}


   {{#children}}
 * {{title}}
   {{/children}}

{{/items}}

 * Today’s Edition
 * Crosswords & Puzzles
 * Most Commented
 * Newsletters
 * Ask Me Anything
 * Virtual Events
 * Betting Sites
 * Online Casinos
 * Vouchers
 * Indy100


Close the sidebar
✕

Log in

Email address

Password

Email and password don't match
Submit
Forgotten your password?


New to The Independent?

Register

Or if you would prefer:

SIGN IN WITH GOOGLE

Want an ad-free experience?

View offers

This site is protected by reCAPTCHA and the Google Privacy notice and Terms of
service apply.

Hi {{indy.fullName}}

 * My Independent Premium
 * Account details
 * Help centre
 * Logout

Close the sidebar