What will DED say when hackers do find an exploitable flaw in iOS? All major DRM systems on every every platform have been broken so far, even those with many many layers of defense-in-depth. Will he say that Apple took shortcuts? Charlie Miller along found 20 OSX 0-day attacks. Is that the famous Apple build quality? Shipping a desktop OS with 20 security holes?
The reality is, all complex software systems have exploitable holes, it is impossible to create a 100% secure system. The idea that Google didn't put any thought into security is ludicrous, if DED actually knew anything about computer software and knew how the Android APK exploit worked, he'd see it isn't a flaw in the architecture, but a flaw in the implementation, the signature check code. So regardless of whether Android had a central Certificate Authority model, or a self-signed model, the exploit would still be there.
There have been flaws in widely used crypto/SSL libraries used by hundreds and thousands of applications, like OpenSSL and GnuTLS. This happens all the time, and many European blackhat hackers have made a business out of selling such exploits to nation states and other blackhats. Android's exploit was found in part because the source code is available.
I love how DED also tries to insinuate that Apple invented the concept of a "web app", a concept which goes all the way back to Active Desktop on Windows and Netscape Desktop. DED has a command of the historical facts already - a command of cherry picking information which conveniently leaves out the whole story, in order to fit a childish hero-worshipping narrative about Apple.
There was nothing technologically innovative about the App Store, the concept of downloadable and installable apps, digitally signed apps, sandboxed apps, apps for money, and on and on, all predated iOS by a decade. Paid J2ME apps on feature phones hit 1 billion installs before 2007. Ryoichi Mori patented SuperDistribution in 1983 which used DRM signing for encrypted app distribution.
Alot of the work, both academic and proof of implementation, was done by companies like Sun Microsystems or General Magic way before, ironically, General Magic was started by ex-Apple employees and Apple ended up suing them and shipping the Newton. The basic architecture since then, has been the same. Sandbox plus signatures for verification.
But this is the problem with zealots -- taking what is a common occurrence in the software industry, people finding exploits because of bugs, and turn it into a one side story complete with lots of bullshit assumptions.
Anyway, here you go: http://arstechnica.com/apple/2011/11/safari-charlie-discovers-security-flaw-in-ios-gets-booted-from-dev-program/
Proof of lazy Apple not caring about build quality and shipping unfinished, buggy code?
DED is possibly the worst Apple beat writer I've ever seen.