Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
It seems odd, how can this contribute to performance and security, opening up the flood gates?

Does encryption / performance and security have to be mutually exclusive ?
It doesn't have to be mutually exclusive, but I mean, it doesn't offer any user data and from what we know there is no way to get user data from this. I don't know...I could be wrong.
 
  • Like
Reactions: page404
Seems odd that jailbreak community praises it for being left open, to help out finding exploits and apple spins it as a good thing, and sketchily, way after beta 1 release

I personally call BS/ catering to federal agencies w/ a backdoor, but I'm a skeptic
 
  • Like
Reactions: mkeeley
I suspect this was the result of a compromise with law enforcement to make the platform more accessible. With the base operating system running unencrypted they can indirectly access the user's data by jailbreaking the phone. Apple can still say it has no access to the user's data and so they'll be able to shift the burden of actually breaking into the phone back onto the government.
 
Last edited:
So has anyone in the tech press asked them why only the 64-bit kernelcache was left unencrypted while the 32-bit kernelcache remains encrypted? What about the update and restore ramdisks, which also remain encrypted? The rest of the boot chain? Why not let us peek at those, too?

Apple PR's statement that "[t]he kernel cache doesn't contain any user info" is ridiculously obvious to anyone with technical knowledge in this area. That statement is clearly only intended to placate the non-technical masses who might hear "Apple" and "unencrypted" in the same sentence and get worried about the privacy battle.

Secondly, what sort of performance improvement can this possibly make? Even assuming the kernelcache has to be decrypted once per boot, that must take what, a couple hundred milliseconds for the hardware-accelerated AES engine to do its thing?

I am really baffled by Apple's response. If it was indeed intentional, it must have been for reasons other than what they are saying.
 
Last edited:
Any word on Apple doing this for OS X? There are still many issues present with the current iteration (ex. Computer freezing after watching videos on YouTube/iTunes) that I think would benefit greatly from this.

The OS X kernel has been open source for over a decade.
 
  • Like
Reactions: xaqt93
People who aren't going to do there research are going to see this and freak out. My grandfather (who looks for reasons to hate technology) loved reading this on his Facebook. He told me, "See! Apple isn't encrypting there next update! They aren't that safe!" I just laughed and explained what it was...explaining this to people who don't know what tech is, is going to be next to impossible.
 
Performance ? Yeah ! And you find it out after 10 major iterations of iOS while now every iOS device has a dedicated hardware Advanced encryption engine ?!

How does it affect performance other then boot time (when the kernel is decrypted) ?!

It's ******** damage control !
 
Yep, total garbage. Some background deal w/ the feds or something if this makes it to release version. There's no reason to un-encrypt something when, apparently, there was a reason to do so before. The performance gains are most likely minimal. If Apple is touting encryption/privacy everywhere, this is a very strange, shady move.
 
I'd just like to point something out. Apple does not offer a bug bounty program. That is to say there is no bounty to be awarded if you report a bug to them no matter how serious it is.

By contrast Microsoft offers $100,000 for a unique kernel level exploit, $15,000 for a Edge browser exploit and $100,000 for a unique solution to a presented exploit that they have yet to come up with / implement.

So if you were to find an Edge browser exploit in Windows 10 and another exploit that allowed you to jump the sandbox and gain root access to the operating system and then figured out a solution to stop the attack that is safe and implementable you could earn yourself $215,000.

Find the same in iOS, macOS, watchOS or tvOS and earn $0. It's about time Apple got serious and offered their own bug bounty program. It's the most meaningful way to get serious vulnerabilities reported.

And remember the FBI and NSA are paying upwards of $1 Million dollars (as shown in congress reports) for root level attacks on iOS, macOS and Windows. That is the competition. If you're a security researcher who're you gonna tell? Apple and earn nothing or the NSA/FBI and change your entire life?
Pssh. What's $215K compared to earning an attaboy in the release notes?

But seriously, excellent post. Apple needs to get a bounty program cobbled together, like yesterday. Not going all tin foil, but if they won't pay for exploits, someone else might.
 
The OS X kernel has been open source for over a decade.
They didn't release XNU-ARM64 or 32's source just decrypted the kernel, incredibly different things. macOS by default has an unencrypted kernel which is also open source. This is more akin to the switch from the optional FileVault 1 which encrypted just the home folder to FileVault 2 which is a full disk encryption on the fly, except in reverse order. The reasoning makes sense, decryption and encryption on the fly can be resource taxing. This may prelude full source release in a few years.

To review unencrypted simply means they are not "scrambling" the binary, a file only readable by MACHINES.

Open source means they release the source code which is what programmers type to make the program and it's logic.

XNU-ARM the core or kernel of iOS is NOT open source, but even if it were that would be fine if not preferable. XNU-x86 of macOS, Linux, BSD, etc are all open source kernels and far more secure than many closed source systems such as Microsoft's NT kernel.
 
I'd just like to point something out. Apple does not offer a bug bounty program. That is to say there is no bounty to be awarded if you report a bug to them no matter how serious it is.

By contrast Microsoft offers $100,000 for a unique kernel level exploit, $15,000 for a Edge browser exploit and $100,000 for a unique solution to a presented exploit that they have yet to come up with / implement.

So if you were to find an Edge browser exploit in Windows 10 and another exploit that allowed you to jump the sandbox and gain root access to the operating system and then figured out a solution to stop the attack that is safe and implementable you could earn yourself $215,000.

Find the same in iOS, macOS, watchOS or tvOS and earn $0. It's about time Apple got serious and offered their own bug bounty program. It's the most meaningful way to get serious vulnerabilities reported.

And remember the FBI and NSA are paying upwards of $1 Million dollars (as shown in congress reports) for root level attacks on iOS, macOS and Windows. That is the competition. If you're a security researcher who're you gonna tell? Apple and earn nothing or the NSA/FBI and change your entire life?

While i totally get your point.. it would suggest that Microsoft's bounty program is meaningless as well (because over $1Million is far more than one could hope to get from Microsoft). You would have to have a bounty program that paid far more. And if i was a betting man, i would bet that the government would have paid whatever was necessary.
 
While i totally get your point.. it would suggest that Microsoft's bounty program is meaningless as well (because over $1Million is far more than one could hope to get from Microsoft). You would have to have a bounty program that paid far more. And if i was a betting man, i would bet that the government would have paid whatever was necessary.

A conscious person would help MS rather than the FBI/NSA, and it have been working for years. Google also have bug bounty program for Android and just now there's a report that they've paid over half a million last year.
 
In Apple marketing terms, this is called innovation.


In Android marketing terms, it's called nothing.

No Android phone has the kernel encrypted, and nobody is giving a slight reference.

What now?

Seems odd that jailbreak community praises it for being left open, to help out finding exploits and apple spins it as a good thing, and sketchily, way after beta 1 release

I personally call BS/ catering to federal agencies w/ a backdoor, but I'm a skeptic

Yep, total garbage. Some background deal w/ the feds or something if this makes it to release version. There's no reason to un-encrypt something when, apparently, there was a reason to do so before. The performance gains are most likely minimal. If Apple is touting encryption/privacy everywhere, this is a very strange, shady move.

No, personally, you both don't have a clue.

If Apple put a backdoor, then now it would be completely visible.
 
If Apple put a backdoor, then now it would be completely visible.

I wouldn't say completely visible. Disassembling a binary and then reading the unlabeled undocumented assembly looking for vulnerabilities is akin to putting a blind man in the middle of a football stadium and asking him to find his way out with all the doors and entrances locked. It's not impossible but it will take some time and perseverance plus it's super boring and frustrating. There is a reason most kernels are written mostly in C and C++ outside of the basest parts, even well written assembly is a pita.
 
I am quite a dumb...How is the difference between 'kernel' and 'kernel cache'?

I see one end of various reports/articles over the net talking about kernel while the other end (Apple's Spokesman) of various reports/articles talking about kernel cache.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.