Hacker Decrypts Apple's Secure Enclave Processor (SEP) Firmware

Hacker Decrypts Apple's Secure Enclave Processor (SEP) Firmware

Registered users can display a profile image alongside their comment.
You can upload your photo here. If you haven't registered you can do so here
Add Comment
Why? - August 17, 2017 at 5:54pm
And what is the purpose of this guy publishing the key? Does it help consumers/users in any way, or was it a total dick move?
KGIII - August 17, 2017 at 8:20pm
That is how security works. We have no idea if others have done it and kept it hidden for nefarious reasons. This also enables more people to check for exploits.
Ledow - August 17, 2017 at 10:21pm
Every device has the same base key used in the same process. If one guy can discover this, then the "security" of that entire system, from the fancy sensors to the security processor itself, is useless against actual targeted attacks. Publishing the key: a) makes it easy to prove he's actually done it, b) prompts Apple to secure their system better and change a key that ANYONE could discover but which secures all their products, c) makes it possible to analyse the protocol that's hidden behind the key for stupid and obvious vulnerabilities (e.g. things Apple might have hoped nobody would ever discover because they wouldn't know the key), d) allows third-party repairs and components to Apple devices (at least, the potential for, temporarily, until they update it). Honestly, NOT publishing it isn't doing anyone any favours. Anyone who wanted to could read his method and follow the same path to get the same keys. Anyone who has the key now will be required to change it (if Apple have half-a-brain). It's like saying "Why publish the CSS key for DVD playback?" - because it's not "secure" at all, proven by the fact that someone obtained the key, and anyone with the same amount of technical skill could do the same and put it on the web or secretly use it against you too. Rather than "security by obscurity" (i.e. let's pretend it never happened and try to scrub all traces of the key from the Internet), when a key is compromised, it should be revoked, reissued, and the design reconfigured so that it's not as easy to compromise the next device. Otherwise you are quite literally just saying "Sshh, we know it's useless, security-wise.... don't tell anyone!".
xerub - August 17, 2017 at 10:28pm
Well put, sir.