Mysterious ‘No Feature’ Updates: Why Is Apple Patching Your Apps?
Toggle Dark Mode
This week, a series of somewhat odd and mysterious app updates have appeared on the App Store, with release notes that imply they’re coming “from Apple” while specifically adding that “No new features are included.”
That preamble appears to contradict the release notes that follow it, which actually do list changes and new features in many cases. However, it turns out that what Apple is doing here is even stranger than you might think. As one developer pointed out on Reddit, Apple isn’t bumping the version numbers; instead, it’s inserting the text into the current version, at the top of the release notes, and pushing out another download.
For example, one popular app that was hit by this is the VLC media player. A version 3.7.2 update pushed out early last week by the developer included a new footer view in the album collection and several other fixes in the release notes. Anyone who installed the update at the time would have seen only those features. However, a few days ago, a new download — with the same version number — appeared with this tagged onto the top of the exact same release notes.
This update from Apple will improve the functionality of this app. No new features are included.
That lines up with a comment by Redditor iSan4eZ who reported that “Apple inserted this text into my app and issued an update with the same version.” However, in an even weirder twist, the same developer followed up a few hours later saying Apple had done one more update to remove the text from the patch notes.
There seems to be no pattern to the apps that are getting this “Update from Apple” treatment, as it ranges from ones that are updated almost weekly to others that haven’t been touched in a year or more. The folks at MacRumors tried to analyze the code of an app that received one of these mystery updates, but couldn’t find any indications of changes.
Several theories have been put forth as to why Apple might be doing this, with some pointing to similar incidents in the past and suggesting it might be something as simple as updating the FairPlay certificates used for DRM copy-protection or modifying the binary to address some unspecified compatibility issues. Others have speculated that it could be related to the DarkSword exploit that’s dominating security news right now, but this appears to be little more than a guess, as it’s not clear how this would apply to such a seemingly random sampling of app, especially since the hacking relies on vulnerabilities in iOS itself, which has been fully patched in updates for nearly everything from iOS 15 to iOS 26.
The most plausible explanation is that this is a “packaging” issue rather than something impacting the code of the apps themselves. Even if it could do so, which is doubtful, it’s hard to imagine Apple messing with the actual code of an app. That would be stepping on developers’ toes and opening a huge can of worms. Plus, unless Apple was prepared to keep doing this, the next app update would undo whatever changes Apple made unless it also informed the developers of them — which it obviously hasn’t done.
However, the packaging includes things like icons, FairPlay copy-protection certificates, and other metadata. Further, Apple has to digitally “sign” every app — a process it calls “notarization” — before they’ll run on an iPhone. There may be situations, such as older, expiring, or compromised certificates, that would require Apple to “re-sign” certain apps, which would in turn require them to be pushed back out to users’ devices.
