Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
LOL! The most uninformed post I've read today.

Maybe read up on Intel's flaws before you post such nonsense.

Another reason why Apple Silicon is a horrible idea. Apple isn't ready, willing, or able to do the groundwork necessary to keep their chips secure. Get used to the Mac going from one of the most secure platforms out there to being ridden with horrible, unpatchable bugs and security exploits.

It's one thing when you can make the OS a walled garden, like with iOS. When you can control the software, you don't need to worry about the hardware being buggy. But unless we're going to have the Mac App Store be the only source for Mac apps, get used to having your computer pwned on a daily basis once Apple Silicon is a reality.
 
Another reason why Apple Silicon is a horrible idea. Apple isn't ready, willing, or able to do the groundwork necessary to keep their chips secure. Get used to the Mac going from one of the most secure platforms out there to being ridden with horrible, unpatchable bugs and security exploits.

It's one thing when you can make the OS a walled garden, like with iOS. When you can control the software, you don't need to worry about the hardware being buggy. But unless we're going to have the Mac App Store be the only source for Mac apps, get used to having your computer pwned on a daily basis once Apple Silicon is a reality.
You got it backwards. This is exactly the reason Apple should be doing the silicon themselves and not trust Intel/AMD or others. They have their fair share of security flaws too.
 
Trust me, I'm far from an Apple hater. As far as I'm concerned, there are two types of computers: Unix* and toys. MacOS as it is is pretty much the ideal operating system. All of Apple's elegance with the power of Unix.

What I DON'T want to see is it becoming iOS Pro—a walled garden where Apple tells you what you can and can't do with THEIR computer. Unfortunately, Apple Silicon is a major step in that direction, and anybody who doesn't see that just needs to look at the history of iOS to understand that nothing except the good will of Apple Inc. is preventing that from happening. My major concern is that Apple just doesn't know any way other than locking things down and dictating terms of acceptable use to its users to maintain a secure system.

*This includes Unix-likes, Linux, BSD, etc.


This whole "your" vs "their" computer/phone thing needs to stop. You own the computer. You can drop it from a helicopter, throw it in a swimming pool, break it or whatever you want. You however do not own the macOS software. If you don't like macOS you can always install Windows on the computer.

I do not own the rights to get Windows 10 source code, change it to where I can never have Edge preinstalled. Its my computer though!
 
"For security reasons, SepOS is stored in the T2 chip’s read-only memory (ROM), but this also prevents the exploit from being patched by Apple with a software update. "

ROM is persistent (and can usually still be updated & reflashed on most hardware).

read-only memory is not only persistent it is read only. Read only means not rewritable. Set once and done.

If this was some Non Volatile RAM (NVRAM) that can be rewriting a couple of handful of times then it would not be "read only".


Even if they mean RAM, then there still isn't anything to stop it being patched.

If it were regular RAM it wouldn't get patched because could not survive a hard reboot ( power all the way off and on). That is exactly where this hack is stuffed; into RAM. And exactly why the hack goes away if you simply power off and reboot the Mac is it looks like it strange state you didn't leave it in.

There is straightfoard fix here which is turn off the Mac and reboot it. Because the T2 OS is in ROM the hacker can't permanently put the hack into the system. That's is the security reason why it is in ROM. Apple does security in layers. One of the layers failed here; not all of them.


Now, the highly disappointing thing by Apple here is that they should put far more effort into the code that is running in Device Firmware Update (DFU) mode. It is an extremely vulnerable state the Mac can be put into and there should be very EXTENSIVE code reviews of anything that is running at that specific time.

If this was a normal operating mode there would be an excuse that their is just too much code to look and and don't have time to deep reviews of everything. But in DFU mode anything not immediately necessary should be off. And all the data being pumped at the T2 should be examined carefully.



More detail is required here.

The unspecified additional hack is the real secret sauce there. The article notes that check8 still can't decrypt the drive. This is would be even more unwieldy if this second step requires some access to the physical logic board or something. Where someone has to not only plug in something on the outside but also probe around the physical T2 chip to trigger this second level hack. It may be just pumping some malformed data to the T2 which responds instead of throwing it away.
 
Look… Apple decided to take hardware on, on their own, 100%. That means there is nobody else to pass the buck to when these problems come up, which they inevitably will.

Once they do that, they do NOT get to just simply say, “Hey, not our problem, this affects everyone”. Apple has to fix the problems, now and forever. Or else they take 100% of the blame for not doing so. This wasn't the case before. which is why we didn't see reactions like that before now.

If Apple thinks they've got this in hand, then let's see them do it. Hell, their hardware hasn't even come out yet, and they've already got a critical exploit to deal with. So yeah, let's hold their feet to the fire and make them deal with this—or are we going to decide that we don't care as long as we get to play Apple's approved version of Candy Crush 4 on the latest iMac Pro Plus?

You do realize that macOS and Windows were patched to address Meltdown and Spectre right? Causing the processors to run a bit slower as a result. They weren't just stuck because it was Intel's processors.

 
since it isn't an attack that can be performed remotely

This is the main part of the problem that people don't understand. Never leave your system on unattended in a public place. Always take it with you. Since this needs physical access, its not the worst thing out there that people here are making it sound.
 
  • Like
Reactions: brucemr
Do you need access to the computer or is this a remote exploit?

You need to access to the Mac in order to run this exploit.
As far as I understand the Mac has to be put in DFU mode, then you can run malicious code, so someone should steal your Mac, put it in DFU and run the software. I don't think it is possible to run the exploit if you plug in a malicious USB-C device, at least if it is not connected while booting.
An attack may happen, but not to the average user
 
  • Like
Reactions: entropys
And making this all public for all budding hackers to read is making things better how exactly...?
 
I do.

Because of flexgate on my MacBook Pro, I shut my screen as little as possible.

Even in public places where this threat is the most possible? Unless you are VERY worried about friends and family. In that case I would suggest talking to them about your concerns :)
 
And making this all public for all budding hackers to read is making things better how exactly...?
This is a long-standing question in the security community - and it's generally agreed the rewards for making it public (allowing users to protect themselves, allowing other security researchers to review/extend the work, getting companies to actually address issues instead of sweeping them under the rug, etc.) are worth the risks (allowing bad actors access to new attacks they might otherwise not know about). After all, there's always the chance that bad actors *already* know about it, and just haven't shared it with the security community.
 
This is a long-standing question in the security community - and it's generally agreed the rewards for making it public (allowing users to protect themselves, allowing other security researchers to review/extend the work, getting companies to actually address issues instead of sweeping them under the rug, etc.) are worth the risks (allowing bad actors access to new attacks they might otherwise not know about). After all, there's always the chance that bad actors *already* know about it, and just haven't shared it with the security community.

Fair point.
 
Well, if the NSA – the state actor – gets hold of my physical hardware, I am toast anyway.

Nothing to see here, move on people.
 
Sure, we'll just wait for the next exploit then. It'll happen sooner or later. And there won't be anyone to pass the buck to when it does.
You must be out of your mind if you think other platforms/chips will be free from exploits in the future.
 
Not a major security issue, no OS or modern computer can ever be 100% secure these days

The days are gone we’re systems were 100% secure from malware and key logging as we could simply turn off and turn back on and instant boot up, tho these were 8-16bit machines and basic the more complex things become the greater the risk
 
You must be out of your mind if you think other platforms/chips will be free from exploits in the future.

It is possible to stop adding more complexity and "Features" on top over time. If do testing and remove the vectors and do not introduce new ones then you can get to a state of closing the defects. That isn't practical in the normal operating mode for a general purpose system. New features and new code are typically needed to sell "new" product. But for a mode like device firmware upgrade (DFU) mode there really shouldn't be much of a new feature now "sizzle" that need to add over time. It is a narrow and focused use case. All the software/firmware that is necessary should be tractable to isolate and fix over time. ( and software that is going to be stuff into read-only (write once) memory should be throughly checked before you do so. Not Yippe-ki-yay it passed a couple of checks so toss it into ROM, but throughly reviewed. )

Same thing for he core security chip. It doesn't have to be bleeding edge out of order , super speculation execution engine. It just needs to reliable first and foremost. That normal application CPU can be completely isolated from that.

Can get to defect free in life critical and high security systems. .It just takes effort and resources and a willingness to limit scope to just what is necessary. That is just incompatible with the "never enough time to do it right, but always time to do it over" approach to general purpose software.
 
Last edited:
  • Like
Reactions: CJ Dorschel
Will Apple do a recall on those affected Macs? I have a 2018 MBP 15 that’s affected.
 
Will Apple do a recall on those affected Macs? I have a 2018 MBP 15 that’s affected.
Don't count on it. They're not going to replace those chips and they're not going to give you a new motherboard just for this.

If there's going to be a fix it will be software/firmware-based that according to this source at least is not possible.
 
Last edited:
Will Apple do a recall on those affected Macs? I have a 2018 MBP 15 that’s affected.

No. this is likely harder to generally exploit than the article suggests. Previous MBP has a firmware password that was resetable if know the "magic" hardware incantation. That was probably broader in scope never was a recall there either.

Apple somewhat brings this upon themselves when they promote the device as being super duper secure with the T2. That basically becomes an invitation for someone to find any kind of complicated way around the security. It is still highly secure in most normal operating modes. If you have lost physical access to your MBP for a long extended period of time then it is kind of in trouble anyway.

Don't loose it and do a power off and reboot when it looks "quite odd" and you'd be just fine. Apple isn't doing to do a billion dollar recall on a very narrow corner case that has nothing to do with the normal operating mode of the device.
 
Another reason why Apple Silicon is a horrible idea. Apple isn't ready, willing, or able to do the groundwork necessary to keep their chips secure. Get used to the Mac going from one of the most secure platforms out there to being ridden with horrible, unpatchable bugs and security exploits.

It's one thing when you can make the OS a walled garden, like with iOS. When you can control the software, you don't need to worry about the hardware being buggy. But unless we're going to have the Mac App Store be the only source for Mac apps, get used to having your computer pwned on a daily basis once Apple Silicon is a reality.

Old School Philosophy: Believe anything is possible. Work hard, persevere, and find a way to succeed. Anything is possible if one believes and doesn’t give up.

Todays Philosophy: Meh, if we aren’t guaranteed immediate success out the door, why bother. Whatever is used today is fine for now until the rest of eternity.
 
  • Like
Reactions: chabig
If Intel's chips have security issues, they affect literally the entire industry. They damn well better get them fixed ASAP, or they have much bigger problems than squashing a bug—like major lawsuits that could put them out of business.

Apple can, will, and has said to its customers that they are SOL and just need to upgrade if they want to get an issue fixed. That's just the reality of living with Apple Silicon. They control literally everything from top to bottom, and if they decide an issue isn't worth fixing because they would make more money by forcing everyone to upgrade, well, that's what happens.

lol... so apparently Intel has a Macrumors account
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.