Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Sunday August 02 2020, @06:59PM   Printer-friendly
from the secure-enclave-isn't dept.

New 'unpatchable' exploit allegedly found on Apple's Secure Enclave chip, here's what it could mean - 9to5Mac:

The Secure Enclave is a security coprocessor included with almost every Apple device to provide an extra layer of security. All data stored on iPhone, iPad, Mac, Apple Watch, and other Apple devices is encrypted with random private keys, which are only accessible by the Secure Enclave. These keys are unique to your device and they're never synchronized with iCloud.

[...] It's important to note that although the Secure Enclave chip is built into the device, it works completely separately from the rest of the system. This ensures that apps won't have access to your private keys, since they can only send requests to decrypt specific data such as your fingerprint to unlock an app through the Secure Enclave.

[...] Now, Chinese hackers from the Pangu Team have reportedly found an "unpatchable" exploit on Apple's Secure Enclave chip that could lead to breaking the encryption of private security keys.

[...] The only thing we know so far is that this vulnerability in Secure Enclave affects all Apple chips between the A7 and A11 Bionic [...] Apple has already fixed this security breach with the A12 and A13 Bionic chips


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Interesting) by Mojibake Tengu on Sunday August 02 2020, @08:42PM (5 children)

    by Mojibake Tengu (8598) on Sunday August 02 2020, @08:42PM (#1030419) Journal

    There is a possible strategy for plausibly hiding planned obsolescence for secured devices:

    1. Put a backdoor in a private construction. Fence it by legal means to prevent accidental discovery.
    2. Keep quiet for a device market lifetime. Market lifetime not necessarily the same length as technological lifetime.
    3. Do not put ("fix") the particular backdoor in next generation of product.
    4. When time has come for marketing a new generation, release the information about old backdoor to public. Preferably by allied channel outlets.
    5. Observe masses of customers dropping old device ahead of its time and buying a new one.

    Intel executed this strategy wrongly. Apple executes it much more effectively.

    --
    The edge of 太玄 cannot be defined, for it is beyond every aspect of design
    Starting Score:    1  point
    Moderation   +3  
       Interesting=3, Total=3
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 4, Interesting) by Bot on Sunday August 02 2020, @10:28PM

    by Bot (3902) on Sunday August 02 2020, @10:28PM (#1030467) Journal

    And this happens barely 3 months after Italy slapped Apple's wrist (10 million euro) confirming the accusation of planned obsolescence tactics.

    --
    Account abandoned.
  • (Score: 4, Insightful) by Mykl on Sunday August 02 2020, @10:35PM (1 child)

    by Mykl (1112) on Sunday August 02 2020, @10:35PM (#1030470)

    6. Have your users wonder whether they should risk buying from you again given the severity of the exploit.

    I still don't buy Sony products [wikipedia.org]. Anyone trying this strategy would want to be supremely confident that their demand will remain inelastic.

    • (Score: 2) by coolgopher on Monday August 03 2020, @02:11AM

      by coolgopher (1157) on Monday August 03 2020, @02:11AM (#1030537)

      Yeah I too stay as far away from both Sony and Intel as I can these days. If Sony hadn't screwed up so royally on multiple occasions I might've been quite fond of their stuff.

  • (Score: 2) by corey on Sunday August 02 2020, @10:40PM (1 child)

    by corey (2202) on Sunday August 02 2020, @10:40PM (#1030472)

    Though plausible, I think your idea is more conspiracy.

    Apple's been working hard to maintain its products' reputation as a secure platform, this damages that even though it's "old" hardware. You may also ask "if the old secure enclaves have this issue, there may be a similar issue in the new ones, we just don't know about it yet."