What is Apple's Secure Enclave and how does it protect iPhone and Mac?
iPhones and Macs have a Touch ID or Face ID that uses its own processor to handle users' biometric information. It's called the Secure Enclave, it's basically a complete computer and it offers a wide range of security features.
Secure Enclave starts separately from the rest of the device. It runs its own small kernel, the operating system or programs running on the device cannot access this section directly. It has 4MB of flash memory, used exclusively for storing elliptic 256-bit personal keys. These keys are unique to your device and are never synced to the cloud or even the device's main operating system cannot be seen directly. Instead, the system requires Secure Enclave to decrypt the information using the keys.
Why does Secure Enclave exist?
Secure Enclave makes it difficult for many hackers to decrypt sensitive information without accessing your device. Because Secure Enclave is a separate system and the main operating system never sees these decryption keys, it is difficult to decrypt the data without proper access.
Please note, biometric information is not stored on the Secure Enclave; 4MB is not enough storage space for all that data. Instead, Enclave stores the encryption keys used to lock that biometric data.
Third-party programs can also create and store keys in the Enclave to lock data, but applications never have access to those keys. Instead, applications that require Secure Enclave encrypt and decrypt data. This means any information encrypted with the Enclave is extremely difficult to decode on any other device.
Below is a reference to Apple documentation for developers:
When storing a private key in Secure Enclave, the user instructs Secure Enclave to create a key, securely store it, and perform operations with it. You only receive the output of these operations, such as encrypted data or cryptographic signature verification results.
Secure Enclave cannot import keys from other devices: it is specifically designed to create and use keys on your phone or computer. This makes it difficult to decode the information on any device.
Secure Enclave hacked?
Secure Enclave is complicated and makes it hard for hackers to access the device using this system. But nothing is absolutely safe. In the summer of 2017, hackers revealed that they had decrypted the Secure Enclave firmware, understanding how the Enclave works. However, it is worth noting that hackers have yet to find a way to retrieve the encryption keys stored in the Enclave: they only decrypt the software.
Delete the Enclave before selling a Mac
The keys in the Secure Enclave on iPhone will be deleted when performing a factory reset. In theory, it will also be deleted when reinstalling MacOS, but Apple advises users to delete Secure Enclave on a Mac if they use anything except the official macOS installer.
See more:
- Secure iPhone after jailbreak
- 6 secure ways on iPhone
- Security "security" for iPhone. How many methods do you know?
You should read it
- How to secure Google Drive on iPhone with Face ID
- Security experts found a way to break iPhone passwords on all versions without worrying about locking or deleting data
- The former Apple engineer claims to be able to unlock all iPhones for $ 15,000
- How to prioritize to enter the passcode interface when opening iPhone
- How to protect email with Face ID or Touch ID on iPhone
- How to set Face ID on iPhone X
- 8 iPhone apps can be locked with Touch ID or Face ID
- 6 secure ways on iPhone
May be interested
- We have been charging the wrong way for a long timethere are many comments on the best way to charge smartphones. most people plug in the charger while they sleep, leaving it 100% overnight. but is this the best way to charge your phone? there is a better way to manage and improve battery life.
- Shortcuts to watch videos on NhacCuaTui often useif you are a regular visitor on nhaccuatui, you should know the useful shortcuts on this popular website instead of having to use the mouse to control the video as before. right now, let's join tipsmake.com with a list of useful shortcuts when watching videos on nhaccuatui.
- How to change WiFi Archer C9 password, replace pass WiFi TP Link Archer C9 simpleyou are using the archer c9 wifi transmitter but do not know how to change the wifi password, so follow these four simple steps to quickly change the wifi pass without resorting to the technical experts.
- How to create a new host file on Windowsfile host is an important system file in windows, if you accidentally accidentally delete it, only create a new host file then copy paste the default information.
- What is the difference between Proxy and VPN?a proxy connects you to a remote computer and the vpn also connects you to a remote computer, so are they one? this is incorrect, let's look at the differences between them and when to use proxy and vpn.
- Quick handling of iPhone screen error is not sensitive and pooris your iphone touch screen in a state of insensitivity, poor touch? don't rush to bring the repair center, you can fix this error at home simply without resorting to professional phone repairers.