what you say makes perfectly good sense to me, and it's kind of like I have always said, "if someone wanted to control my computer, take over my identity for personal gain, why would they waste all their time and effort to rip off my $128 and 23cents, when they can put in the same time and effort to rip off someone who's worth $128 million dollars?Here's what i found with 2 seconds of google:
PACMAN M1 chip defeats last line of Apple Silicon security
A so-called PACMAN M1 chip attack created by MIT security researchers succeeded in defeating what has been described as “the...9to5mac.com
And here's the summary:
And here's my comments as a network security guy:
If someone has unfettered physical access to your machine, you're boned.
This is a hardware hacking attack requires physical access.
The short version is this: nothing to worry about unless you leave your machine unattended where bad guys can get access to it - and you're interesting enough for someone to go to the trouble to do this.
And even then, there's plenty of other things they can do with physical access. The likelyhood of this being used is probably limited to nation-state sponsored attacks (NSA/FSB and the like), where the attacker could just as easily beat your password/touchId/etc. out of you with a pipe. Or drop a camera in your home to record you typing your password, etc.
It's a vulnerability, sure - but not one that has any practical application that couldn't just be achieved by more conventional means. I'm sure apple will fix it in the M3 if it hasn't been fixed in M2, but in the mean-time there's little to worry about.
what you say makes perfectly good sense to me, and it's kind of like I have always said, "if someone wanted to control my computer, take over my identity for personal gain, why would they waste all their time and effort to rip off my $128 and 23cents, when they can put in the same time and effort to rip off someone who's worth $128 million dollars?
thanxz for the reply
If it requires direct physical contact, then it means it's not as exploitable. Unless you know you do work that is highly sensitive that you need to carry your machine around.
Probably has it if the vulnerability was:i say let's wait to see if m2 has that same vulnerability
could anyone explain to me what physical access does the attacker has to use in order to hack the chip ? i dont get it
is it sth that can be done without opening the mac ?
Here's what i found with 2 seconds of google:
PACMAN M1 chip defeats last line of Apple Silicon security
A so-called PACMAN M1 chip attack created by MIT security researchers succeeded in defeating what has been described as “the...9to5mac.com
And here's the summary:
And here's my comments as a network security guy:
If someone has unfettered physical access to your machine, you're boned.
This is a hardware hacking attack requires physical access.
The short version is this: nothing to worry about unless you leave your machine unattended where bad guys can get access to it - and you're interesting enough for someone to go to the trouble to do this.
And even then, there's plenty of other things they can do with physical access. The likelyhood of this being used is probably limited to nation-state sponsored attacks (NSA/FSB and the like), where the attacker could just as easily beat your password/touchId/etc. out of you with a pipe. Or drop a camera in your home to record you typing your password, etc.
It's a vulnerability, sure - but not one that has any practical application that couldn't just be achieved by more conventional means. I'm sure apple will fix it in the M3 if it hasn't been fixed in M2, but in the mean-time there's little to worry about.
Or your desk is in a more public area. On a Mac, I'd think that any add-on would be seen fairly soon. I was freaked out to find an external credit card skimmer at the local gas station a few years ago. It was obvious it wasn't right, and I moved to a different pump that didn't have the plastic piece on the front of the slot. I told the cashier, and she looked at me with vacant eyes, so I told a few other people there. *yikes* But it made the news that night.
A kext is not required; they just used one for reverse engineering and to demonstrate their proof of concept.It’s hardly a „security flaw“. The author of the article has stated that in order to carry out this exploit one needs to install a kernel extension. Basically this exploit already requires privileged access to even work. If your machine is so compromised that someone can change your security settings and patch your kernel, they already have your password and can do pretty much anything they want.
Here's what i found with 2 seconds of google:
PACMAN M1 chip defeats last line of Apple Silicon security
A so-called PACMAN M1 chip attack created by MIT security researchers succeeded in defeating what has been described as “the...9to5mac.com
And here's the summary:
And here's my comments as a network security guy:
If someone has unfettered physical access to your machine, you're boned.
This is a hardware hacking attack requires physical access.
The short version is this: nothing to worry about unless you leave your machine unattended where bad guys can get access to it - and you're interesting enough for someone to go to the trouble to do this.
And even then, there's plenty of other things they can do with physical access. The likelyhood of this being used is probably limited to nation-state sponsored attacks (NSA/FSB and the like), where the attacker could just as easily beat your password/touchId/etc. out of you with a pipe. Or drop a camera in your home to record you typing your password, etc.
It's a vulnerability, sure - but not one that has any practical application that couldn't just be achieved by more conventional means. I'm sure apple will fix it in the M3 if it hasn't been fixed in M2, but in the mean-time there's little to worry about.
Not really. What it requires is another security vulnerability. They used a KEXT to create a vulnerability for their proof of concept. This also doesn't require physical access. It requires other vulnerabilities. Physical access is required to execute the proof of concept. They weren't trying to create an exploit but to show that there is a flaw in a security feature of various very modern Arm CPUs including the M1 and probably the M2.It’s hardly a „security flaw“. The author of the article has stated that in order to carry out this exploit one needs to install a kernel extension. Basically this exploit already requires privileged access to even work. If your machine is so compromised that someone can change your security settings and patch your kernel, they already have your password and can do pretty much anything they want.
My understanding is that PAC isn't to prevent attacks, but to prevent attacks from progressing further. It's the last lock to pick, not the first.So if I’m understanding this correctly, the vulnerability is in pointer authentication itself, which is pretty bad considering the point of pointer authentication is to prevent attacks?