Hackers have deciphered Apple's Secure Enclave security chip
A hacker with the pseudonym Xerub revealed the decryption key for Apple's Secure Enclave Processor (SEP) security chip.
This leak (confirmed by an Apple employee) is very important for iOS's security system because it allows hackers and researchers to secure access to previously-encrypted iOS components.
SEP handles TouchID operations and some iOS codes
Apple describes SEP in the official security guide as a separate processor located next to the main CPU. This SEP processor runs its own low-end operating system, has an update process, a separate boot system and uses only encrypted memory simultaneously including the hardware random number generator ( RNG) by itself.
According to information from Apple, SEP began to be deployed from the processors of Apple S2, Apple A7 and later A-series and was used to process data by encryption, then used used to verify TouchID transactions.
On Wednesday, Xerub announced the SEP firmware protection encryption key. You can get the key from here.
The publicly available SEP decryption key will allow hackers, monitoring companies and many others to analyze and search for bugs in iOS devices that they did not previously have access to.
New exploits can be developed without the need for fingerprint verification steps to access locked devices or to approve "illegal" financial transactions through payment solutions such as Apple Pay and other Other provisions.
The decoding of this security chip may sound serious but your data will still be safe. According to Apple, users do not need to worry too much about this issue.
You should read it
- Decode the meaning of Intel processor chip name structure
- What is Microsoft's Pluton Security Processor? How does it work?
- Apple will stop using Intel chips on Macs from 2020, switching to 'homegrown' chips.
- Apple's A14 chip is likely to be the first mobile processor to exceed 3GHz
- The router is not as safe as you think
- TSMC is ready for the 5nm process, the first product will be the Apple A14 Bionic?
- Millions of Android devices stick with security holes in firmware, hackers can exploit to lock users' machines
- How to Update Router Firmware
May be interested
- Top 10 brilliant hackershere are 10 hackers who attacked and caused the most serious consequences ever known in the history of the internet.
- 8 best secure email services ensure your privacysecurity is always a big problem for online, especially ensuring privacy in email accounts. this article will introduce you to the 8 best security email services to keep data safe from hackers and authorities.
- White-hat hackers, from their passion to the job to earn money, and little-known thingswhite hat hackers - heroes who don't cloak!
- Security experts found a way to break iPhone passwords on all versions without worrying about locking or deleting datamatthew hickey, a security researcher at hacker house, recently figured out a way for brute force attacks to unlock any iphone or ipad device, despite being updated to the latest ios version.
- Meaning of names of different apples in the worldthere are many different types of apples. of course, each type has its own unique flavor. let's explore the history of the names of popular apples around the world!
- The router is not as safe as you thinkit all depends on whether your router is secure. here are 10 ways that your router may be exploited by hackers and other intruders.
- Chinese hackers target 27 major universities around the worldaccording to a recent report by network security company idefense, chinese hackers have conducted large-scale attacks to nearly 30 universities in the us and around the world.
- 10 operating systems for security research preferred by hackershere is a list of 10 computer operating systems used by hackers worldwide, please refer.
- Overview of vulnerabilities on Intel, AMD, ARM chips: Meltdown and Spectertwo newly discovered major computer chip security bugs, called meltdown and specter, affect most of the devices manufactured in the last 20 years. the level of influence of these two security bugs on devices is still being calculated, but it can lead to the server on the cloud computing platform being compromised, leading to bad effects. than.
- What is Microsoft's Pluton Security Processor? How does it work?the first computers 'packaged' with microsoft's pluton secure processor will be available as soon as this 2022, accompanied by amd ryzen 6000 laptop cpus.