Replies (16)

Jonathan's avatar
Jonathan 1 year ago
Makes you wonder if it's intentional.
Dang. I would have thought the key would be loaded with greater memory safety. Is the key something hard coded on-chip? It's be really odd, but I could see Apple hard coding the keys into their chips, since "proprietary" is their SOP.
Default avatar
sms 1 year ago
#asknostr How does this affect access to password managers on M Apples?
Default avatar
sms 1 year ago
#Linux runs on Apple M, and i think would not be safe from this, because it’s a hardware design flaw.
As far as I understand it, you will need physical access to the machine and know what you are doing. If someone has physical access to my machine, breaking encryption is probably not my biggest problem right now.
Tim Apple: “Whoops, they found the backdoor we put into our $1500+ machines for you guys” NSA: “Meh, won’t matter, they’ll keep buying your overpriced laptops, add a couple of new colors next year and say revolutionary a few extra times during the presentation “
No 😢 the article suggests any code running in user mode can attempt, sounds like indirect access to memory via cache, so just a matter of waiting and watching for long enough to collect what you need. If a browser running js can trigger it …. sounds pretty bad/deliberate regardless #notyourkeys
my point is not of "trust but verify" variety i own apple and non apple products. in light of this news my apple devices are compromised and i must wait for apple hardware to catch up. if hardware for my non apple products suffered such an issue i could easily move to another piece of hardware
fair enough. my point is that these sorts of issues happen to non apple hardware all the time. e.g. many people seem to believe that simply running linux will protect them from such vulnerabilities. this is a major oversight. one worth acknowledging and correcting, in my view.