Apple is finally dismantling a 14-year-old restriction in iOS 27, allowing users to add custom pass types—including tickets, loyalty cards and event passes—to Wallet via the “Cartes” section. This shift, confirmed across multiple leaks and developer reports, dismantles Apple’s long-standing closed-loop policy for pass issuance, forcing a reckoning with third-party developers and rival platforms like Google Pay. The move arrives as Apple’s M-series chips dominate mobile NPU workloads, although its secure enclave architecture faces scrutiny over third-party data access. Here’s what’s changing—and why it matters.
The Architectural Earthquake: How Apple’s PassKit API is Finally Cracking Open
For over a decade, Apple’s PassKit framework enforced a hard rule: only passes issued by Apple’s certified partners (or Apple itself) could be added to Wallet. This wasn’t just a UI limitation—it was a technical restriction baked into the PKPassKit API’s PKAddPassesViewController class, which explicitly blocked custom pass types unless explicitly whitelisted by Apple’s server-side validation. Developers could create passes, but users couldn’t add them without jumping through hoops like QR code scans or manual entry.
The change in iOS 27 isn’t just about user convenience—it’s a fundamental rewrite of the PassKit architecture. Sources close to Apple’s Wallet team confirm that iOS 27 introduces a new PKCustomPassType enum, which allows developers to register their own pass schemas (e.g., com.example.eventTicket) without Apple’s prior approval. Under the hood, this requires:
- A revised
PKPassLibrarysession that supports dynamic pass type discovery viaPKPassTypeobjects. - Updated
PKAddPassesViewControllerto accept unsigned pass bundles (though Apple retains cryptographic validation via its PassKit signing service). - Support for
PKPassTypeIdentifierin theinfo.plistof custom pass apps, enabling deep linking to Wallet.
This isn’t just an API tweak—it’s a philosophical shift. Apple’s secure enclave, which has long been the gold standard for hardware-backed security, now faces a new challenge: balancing openness with its zero-trust model. The enclave’s role in validating passes is expanding, but so is the attack surface for malicious pass issuers. “Apple’s enclave is bulletproof for Apple’s own passes, but third-party custom passes introduce new vectors for replay attacks or spoofed signatures,” warns Dr. Elena Vardarajan, CTO of CryptoLux, a firm specializing in secure enclave audits. “The question is whether Apple’s SecKey API can scale to verify thousands of new pass types without degrading performance.”
“This is the first time Apple has treated Wallet as a truly extensible platform. The challenge now is ensuring that the secure enclave’s performance doesn’t become a bottleneck as custom passes proliferate. Benchmarks on the M5 show that enclave operations add ~12ms latency per pass validation—acceptable for Apple’s passes, but problematic if every slight business starts issuing custom passes.”
The Ecosystem Gambit: Why Apple’s Move is a Double-Edged Sword for Developers
Apple’s decision to open Wallet isn’t just about pleasing users—it’s a strategic play in the platform lock-in arms race. For years, Google Pay and Samsung Pay have allowed custom passes, but Apple’s ecosystem has been a fortress. Now, with iOS 27, Apple is forcing third-party developers to choose between building for Wallet or risking fragmentation.
Consider the implications:
- Developers gain: No more workarounds like QR codes or manual entry. A single API call (
PKPassLibrary.addPasses([customPass])) will suffice. - Developers lose: Apple’s
PKPass.hheader now requiresNSAppTransportSecuritytweaks for HTTPS validation, and custom passes must comply with Apple’s strict pass issuance guidelines, including mandatoryPKPassFormatVersioncompliance. - Rival platforms win: Google Pay and Samsung Pay can now leverage Apple’s ecosystem as a distribution channel, effectively turning Wallet into a
PKPass-compatible extension of their own systems.
The real wild card? Open-source pass frameworks. Projects like OpenPass (a community-driven alternative to PassKit) could see renewed interest, but they’ll need to reverse-engineer Apple’s PKPass binary format—a task made easier by iOS 27’s relaxed validation but still non-trivial due to Apple’s SecKey cryptography.

Meanwhile, enterprise IT teams are already scrambling. “Apple’s move could disrupt MDM policies,” says Mark Harrison, VP of Mobile Security at Lookout. “If custom passes bypass traditional app store distribution, IT admins will need to audit every PKPass bundle for malware—something no MDM vendor is currently equipped to handle.”
“Apple’s decision to open Wallet is a masterstroke for consumer adoption, but it’s a nightmare for enterprise security. The secure enclave was designed for Apple’s controlled ecosystem. Now, it’s being asked to trust thousands of third-party pass issuers—many of whom won’t have the same security standards.”
The Benchmark Battle: How M5’s NPU Handles the PassKit Overhaul
Apple’s M-series chips have long been the backbone of Wallet’s performance, but iOS 27’s changes introduce new computational demands. The PKPassLibrary now offloads more work to the NPU (Neural Processing Unit), particularly for:
- Dynamic pass rendering: Custom passes with complex animations (e.g., real-time ticket updates) now use the NPU’s
MLComputeframework to accelerate Core Graphics operations. - Biometric validation: Face ID/Touch ID checks for custom passes are now processed via the NPU’s
SecKeyacceleration, reducing latency by ~30% compared to CPU-based validation. - Server-side sync: The NPU assists in decrypting Apple’s
PKPassServerresponses, which are now signed with ECDSA-P256 rather than RSA-2048 (a shift that cuts verification time by ~40%).
Benchmarking the M5’s NPU under these new loads reveals mixed results:
| Operation | M1 (2020) | M2 (2022) | M5 (2026) | Improvement |
|---|---|---|---|---|
| Pass rendering (complex) | 120ms | 85ms | 55ms | +37% |
| Biometric validation | 180ms | 140ms | 90ms | +35% |
| Server sync decryption | 220ms | 160ms | 100ms | +38% |
The M5’s NPU excels here, but the real bottleneck isn’t silicon—it’s Apple’s secure enclave bandwidth. “The enclave’s memory bus is saturated when validating custom passes,” notes AnandTech’s deep dive into iOS 27’s performance. “Apple could mitigate this by offloading more to the NPU, but that risks weakening the enclave’s isolation guarantees.”
The Antitrust Angle: Is Apple’s Wallet Move a Regulatory Landmine?
Apple’s decision to open Wallet isn’t just a technical shift—it’s a regulatory tightrope walk. The EU’s Digital Markets Act (DMA) requires Apple to allow “interoperability” with third-party payment systems, but Wallet’s custom passes could be seen as a de facto lock-in mechanism. Here’s the catch:

- Apple’s defense: “Wallet is now more open than ever,” the company could argue, pointing to custom passes as compliance with DMA’s interoperability rules.
- The EU’s counter: If Apple’s
PKPassformat remains proprietary (as it is), regulators may argue it’s not truly interoperable—just a closed system with a prettier UI. - The wild card: Google and Samsung could leverage Apple’s ecosystem by encouraging users to add their passes to Wallet, creating a de facto multi-platform standard—something Apple has long resisted.
Legal experts are already parsing the implications. “Apple’s move is a classic co-opetition strategy,” says Dr. Sarah Chan, a tech policy analyst at Stanford’s Center for Internet and Society. “They’re opening Wallet just enough to avoid DMA penalties, but not so much that they lose control of the ecosystem. The question is whether the EU will call their bluff.”
“Apple’s Wallet opening is a masterclass in regulatory arbitrage. They’ve found a way to appear compliant while maintaining near-total control. The EU will need to decide: Is a proprietary pass format that happens to be user-accessible ‘interoperable’? Or is it just a Trojan horse for deeper platform lock-in?”
The 30-Second Verdict: What You Need to Do Now
If you’re a developer:
- Start testing
PKCustomPassTypein iOS 27’s beta. The updated PassKit docs are sparse, but reverse-engineering thePKPassbundle format is now easier. - Audit your pass issuance pipeline for
SecKeycompatibility. Apple’s enclave validation is stricter than ever. - Prepare for fragmentation. If you don’t support Wallet, users will still add your passes—but they’ll do it via QR codes or manual entry, defeating the purpose.
If you’re a user:
- Update to iOS 27 beta (rolling out this week) to test custom passes. Expect glitches—Apple’s validation system is still in flux.
- Beware of phishing passes. Custom passes can’t be verified by Apple alone. rely on trusted issuers.
- Watch for Google/Samsung integration. Rival platforms will push their passes to Wallet, turning it into a multi-platform hub—something Apple has avoided for years.
If you’re an enterprise IT admin:
- Update your MDM policies to scan for
PKPassbundles. Apple’s new pass format bypasses traditional app store checks. - Push for enclave-level audits of custom passes. The M5’s NPU can’t secure what it can’t inspect.
- Prepare for user pushback. Employees will demand custom passes for internal systems—your job is to secure them.
The bottom line? Apple’s Wallet overhaul is a pivot—not a revolution. It’s enough to keep users happy, enough to fend off regulators, but not enough to truly open the ecosystem. The real battle isn’t about custom passes; it’s about who controls the PKPass standard next. And for now, that’s still Apple.