Hackers have deciphered Apple's Secure Enclave security chip
A hacker with the pseudonym Xerub revealed the decryption key for Apple's Secure Enclave Processor (SEP) security chip.
This leak (confirmed by an Apple employee) is very important for iOS's security system because it allows hackers and researchers to secure access to previously-encrypted iOS components.
SEP handles TouchID operations and some iOS codes
Apple describes SEP in the official security guide as a separate processor located next to the main CPU. This SEP processor runs its own low-end operating system, has an update process, a separate boot system and uses only encrypted memory simultaneously including the hardware random number generator ( RNG) by itself.
According to information from Apple, SEP began to be deployed from the processors of Apple S2, Apple A7 and later A-series and was used to process data by encryption, then used used to verify TouchID transactions.
On Wednesday, Xerub announced the SEP firmware protection encryption key. You can get the key from here.
The publicly available SEP decryption key will allow hackers, monitoring companies and many others to analyze and search for bugs in iOS devices that they did not previously have access to.
New exploits can be developed without the need for fingerprint verification steps to access locked devices or to approve "illegal" financial transactions through payment solutions such as Apple Pay and other Other provisions.
The decoding of this security chip may sound serious but your data will still be safe. According to Apple, users do not need to worry too much about this issue.
You should read it
- Decode the meaning of Intel processor chip name structure
- What is Microsoft's Pluton Security Processor? How does it work?
- Apple will stop using Intel chips on Macs from 2020, switching to 'homegrown' chips.
- Apple's A14 chip is likely to be the first mobile processor to exceed 3GHz
- The router is not as safe as you think
- TSMC is ready for the 5nm process, the first product will be the Apple A14 Bionic?
- Millions of Android devices stick with security holes in firmware, hackers can exploit to lock users' machines
- How to Update Router Firmware
May be interested
- Ad Tracker on e-commerce site can flip the Bitcoin transaction maskthe study announced last week that cookies and other information collected by ad tracker on e-commerce sites can be used to flip an anonymous mask of bitcoin transactions.
- Igexin advertising API brings spyware to steal user informationmobile developers, if you find an easy-to-use advertising api, make sure it's not snoopware.
- Trojan banks surpass the malware defense of Google Playbankbot shelter on the game is said to be very fun.
- New malware-digging tool on Linux devicesa malware author has just created a digital digging tool that infects linux devices, using open or default telnet login information.
- New variant of ransomware Arena Crysis appearedresearcher michael gillespie has discovered a new variant of ransomware crysis / dharma that adds the .arena extension to the encrypted file.
- Watch out for the risk of spreading the virus from Facebook Messenger on Windows, MacOS and Linuxsecurity researchers at kaspersky lab have discovered a cross-platform campaign taking place on facebook messenger - where users often get video links directed to a fake site, tricking users into installing malware.