Imagine you were a dodgy Chinese manufacturer of innocent hardware (perhaps a mouse / keyboard) that plugged in via USB-C but contained hidden firmware to jailbreak the T2 chip, inject code into the OS and create a botnet of pwned T2 macbooks.
Still think it would be impossible without having access to the machine? 🤔
Still think it would be impossible without having access to the machine? 🤔
Last edited: