Agreed, the pre-2016 Macs were one of the best, I found in all truthfulness the 2012 rMBP to be the absolute best laptop I've ever owned.but I really think the Intel Mac era is going to be looked back upon as the golden age of the Mac.
Agreed, the pre-2016 Macs were one of the best, I found in all truthfulness the 2012 rMBP to be the absolute best laptop I've ever owned.but I really think the Intel Mac era is going to be looked back upon as the golden age of the Mac.
As someone with just a few posts, have a read of the thread, before jumping to conclusions.It's funny because that a supposed to be a secured security chip now become a flaw to security.
Its not jumping to conclusions when the story mentions this:As someone with just a few posts, have a read of the thread, before jumping to conclusions.
This vulnerability is reportedly able to hijack the boot process of the T2's SepOS operating system
Exaggerating the reaction towards Apple after the first security flaw of a chip when the history of AMD and Intel's doesn't need citing...how is that not a knee jerk biased dooms day reaction that we usually see on MR forums?
As if the kernel panics it's causing weren't bad enough. The whole existence of the T2 Chip is one big unfixable flaw that belongs in the Mac graveyard together with the butterfly keyboard and Touch Bar. And while spending time in there, let's bring back MagSafe from the dead, shall we?
The Mac has been on a slow death spiral since Tim took over and I doubt it will ever get better
When you can control the software, you don't need to worry about the hardware being buggy
Agreed, the pre-2016 Macs were one of the best, I found in all truthfulness the 2012 rMBP to be the absolute best laptop I've ever owned.
So it's a non-persistent vulnerability that needs malicious hardware plugged in to keep working. TBH if you have malicious hardware plugged in then you've already got a major problem.
Is my MacBook still secure if someone steals it from my room whilst I'm away and it's switched off - the answer appears to be yes. I'm not really clear that it's actually a big deal as you need to run the compromise with device on, which would imply you've compromised the user account and have access to the data anyway.
Look… Apple decided to take hardware on, on their own, 100%. That means there is nobody else to pass the buck to when these problems come up, which they inevitably will.
Once they do that, they do NOT get to just simply say, “Hey, not our problem, this affects everyone”. Apple has to fix the problems, now and forever. Or else they take 100% of the blame for not doing so. This wasn't the case before. which is why we didn't see reactions like that before now.
If Apple thinks they've got this in hand, then let's see them do it. Hell, their hardware hasn't even come out yet, and they've already got a critical exploit to deal with. So yeah, let's hold their feet to the fire and make them deal with this—or are we going to decide that we don't care as long as we get to play Apple's approved version of Candy Crush 4 on the latest iMac Pro Plus?
I found in all truthfulness the 2012 rMBP to be the absolute best laptop I've ever owned.
Nonsense. Apple works relentlessly on security. Note that it's become increasingly hard for jailbreakers to find a method to jailbreak iPhones. Notice that the flaw in the T2 chip has already been fixed. And lastly, notice that intel's chips have had worse security issues. Only the most naive and uninformed person thinks 100% security is achievable. In the scheme of things, this isn't the worst risk, since it isn't an attack that can be performed remotely.Another reason why Apple Silicon is a horrible idea. Apple isn't ready, willing, or able to do the groundwork necessary to keep their chips secure. Get used to the Mac going from one of the most secure platforms out there to being ridden with horrible, unpatchable bugs and security exploits.
It's one thing when you can make the OS a walled garden, like with iOS. When you can control the software, you don't need to worry about the hardware being buggy. But unless we're going to have the Mac App Store be the only source for Mac apps, get used to having your computer pwned on a daily basis once Apple Silicon is a reality.
It's one thing when you can make the OS a walled garden, like with iOS. When you can control the software, you don't need to worry about the hardware being buggy. But unless we're going to have the Mac App Store be the only source for Mac apps, get used to having your computer pwned on a daily basis once Apple Silicon is a reality.
the fandom all out to defend and dither. typical
Well yes but on a chip whose sole purpose is security...? That’s not great is it.
No question but they do so behind closed doors, where most other organization do everything out in the open to allow others to review and try to break it. Without such peer review, there are inherent weaknesses that can creep inApple works relentlessly on security
Someone on a Mac news site being obnoxious about Mac users. Sadly even more typical. Hopefully at some point you'll actually grow up enough to be embarrassed about this kind of childish nonsense. Your post adds absolutely nothing of substance. From the fans about whom you sneer though, there are genuinely 3 valid defenses: 1) The attack can't be done remotely. 2) The vulnerability was already detected and fixed by Apple, so at least forthcoming chips should hopefully be immune. 3) The attack isn't persistent, so a reboot apparently purges it.the fandom all out to defend and dither. typical
did u miss the part where I said this is fixed in the A12 and intel chips have even worse security issues..
Unless I've misunderstood this, you have to be physically with the machine, with a mailicous USB device plugged in, with the device already unlocked by the user of the device?
Have we already forgotten about Meltdown and Spectre, which affected intel cpus and AMD (to a lesser degree)? The problem I think is relying on unpatchable hardware for security. There is bound to be an exploit in any security system just waiting to be discovered. What makes or breaks is whether that system can be updated to address the exploit.Another reason why Apple Silicon is a horrible idea. Apple isn't ready, willing, or able to do the groundwork necessary to keep their chips secure. Get used to the Mac going from one of the most secure platforms out there to being ridden with horrible, unpatchable bugs and security exploits.
It's one thing when you can make the OS a walled garden, like with iOS. When you can control the software, you don't need to worry about the hardware being buggy. But unless we're going to have the Mac App Store be the only source for Mac apps, get used to having your computer pwned on a daily basis once Apple Silicon is a reality.
Not always...The problem here is that this issue, if verified, isn't patchable. At least Intel's are.
Apple has a security bounty program, so compensation is provided.Yikes.
Also, I find it extremely disappointing that every time a security researcher voluntarily notifies Apple of such threats—be they patchable or otherwise—and after no doubt spending a lot of their own time uncompensated researching them, the response from Apple is always silence; or (if you’re lucky) a long, protracted delay before they even acknowledge your effort with a reply.
That’s quite pathetic really. The least they could do is get someone to call this guy personally to thank him and assure him that it’s being looked into. Perhaps even keep him in the loop on progress. From a public relations perspective that is the right thing to do. And Apple wonders why some people just go straight to the media instead! I don’t feel motivated to bug-test for Apple because of this.
But by the looks of things there’s nothing they can do and our Macs aren’t as secure as Apple claimed!