TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Apple’s T2 security chip jailbreak

741 pointsby Yeriover 4 years ago

17 comments

aunali1over 4 years ago
Hi guys, I am part of the team working on all things T2. [1]<p>The checkra1n support is just in a PoC state, it will successfully exploit and boot the T2. The payload support is partially broken, but being worked on.<p>Additionally, we have SSH working over usbmuxd from a tethered device [2] and SSH working from macOS on device, with an SDK in the works [3].<p>Some key takeaways from the T2 being jailbroken:<p>- Custom Bootloaders (OpenCore, Coreboot, etc) are now possible as the T2 validates&#x2F;sends the UEFI payload to PCH using a bridgeOS binary called MacEFIUtil, which can trivially have its signature checks patched.<p>- Filevault and by extension Touch ID are more or less crippled, especially in light of the recent SEP exploits. Amusingly, Apple uses a hardcoded &quot;passcode&quot;, analogous to an iDevice&#x27;s unlock pin in plain text within the UEFI firmware.<p>- Support for In-System Debugging of the PCH&#x2F;Intel processor over USB. This works in a similar fashion to those Bonobo cable used for debugging iDevices [4]. We are working on building an accessory that you can purchase and plug into your Mac with a USB male endpoint exposing Intel&#x27;s DCI debugging protocol.<p>- Lightweight AppleSilicon Tinkering environment. With SSH support from macOS on device, and the T2&#x27;s modest specs, its a nice sandbox for messing with arm64 stuff. It&#x27;s a pretty peppy chip, at times coming close to my 8th gen i7...yikes.<p>1. <a href="https:&#x2F;&#x2F;www.theiphonewiki.com&#x2F;wiki&#x2F;T8012_checkm8" rel="nofollow">https:&#x2F;&#x2F;www.theiphonewiki.com&#x2F;wiki&#x2F;T8012_checkm8</a><p>2. <a href="https:&#x2F;&#x2F;twitter.com&#x2F;qwertyoruiopz&#x2F;status&#x2F;1237904335184564224" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;qwertyoruiopz&#x2F;status&#x2F;1237904335184564224</a><p>3. <a href="https:&#x2F;&#x2F;twitter.com&#x2F;su_rickmark&#x2F;status&#x2F;1286886010681462784" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;su_rickmark&#x2F;status&#x2F;1286886010681462784</a><p>4. <a href="http:&#x2F;&#x2F;bonoboswd.com&#x2F;" rel="nofollow">http:&#x2F;&#x2F;bonoboswd.com&#x2F;</a>
评论 #24636884 未加载
评论 #24637058 未加载
评论 #24637707 未加载
评论 #24637263 未加载
评论 #24636734 未加载
评论 #24637612 未加载
评论 #24649849 未加载
评论 #24640496 未加载
评论 #24637156 未加载
评论 #24637599 未加载
评论 #24638875 未加载
评论 #24637923 未加载
aneutronover 4 years ago
The fact that Apple uses this chip to, among other things, block &quot;unauthorized repair&quot; (can&#x27;t change a freaking SSD in 2020, really), makes me very happy that people are finding ways to break this chip to make repairs more accessible.<p>On the other hand, this could have serious implications on the iOS security model for example.<p>And I&#x27;m pretty sure someone is gonna run Doom on the touchbar in some months.
评论 #24636371 未加载
评论 #24636459 未加载
评论 #24638266 未加载
评论 #24638415 未加载
评论 #24637081 未加载
评论 #24636700 未加载
dividedbyzeroover 4 years ago
I&#x27;m torn on this; on the one hand, the prospect of being able to circumvent things like unauthorized repair prevention down the line is neat, and who knows what people may be able to tease out of this (apparently quite powerful chip). So that&#x27;s neat.<p>But it also breaks Apple&#x27;s security platform in a big way, since this should make Apple&#x27;s biometry scheme in their Macbooks much weaker and FileVault a lot easier to crack. That&#x27;s a shame, because it&#x27;s a very neat and cohesive security platform that gets out of one&#x27;s way and works really well even for highly non-technical people. Their security stance is one of the things that keep me in Apple&#x27;s ecosystem and I know a number of people and companies who feel alike. So, coming from that point of view, I do hope they fix this in time for their first round of ARM Macs.
评论 #24638168 未加载
评论 #24637300 未加载
评论 #24638453 未加载
评论 #24637953 未加载
评论 #24637050 未加载
评论 #24646028 未加载
评论 #24637278 未加载
bartvkover 4 years ago
I wonder if this has security implications. The T2 houses the &quot;secure enclave&quot; and that&#x27;s where your private keys, certificates and passwords are stored.
评论 #24636403 未加载
评论 #24645004 未加载
评论 #24636378 未加载
javajoshover 4 years ago
If you follow the links you&#x27;ll find <a href="https:&#x2F;&#x2F;checkra.in&#x2F;" rel="nofollow">https:&#x2F;&#x2F;checkra.in&#x2F;</a> which gives you a dmg download - however the release notes don&#x27;t mention anything about a T2 jailbreak. I would treat this with skepticism.
评论 #24636336 未加载
评论 #24636345 未加载
californicalover 4 years ago
This is huge! Does anyone know if Apple is able to ship updated software to patch this? I thought the T2 was fairly isolated from the rest of the system. If it’s not easy to fix OTA, this will be really painful for security.<p>Excited to see what sorts of things people build from this though! Would be cool to run a mini OS on the touch bar when the rest of the system is powered off.
评论 #24636394 未加载
mmastracover 4 years ago
Interesting. Does this mean that companies can now use this to unlock corp laptops that ex-employees have iCloud&#x2F;activation-locked to their personal accounts without Apple&#x27;s help? [+]<p>[+] Yes, I realize that this also applies to stolen laptops, but this is an actual pain point with running fleets of Macs, from what I&#x27;ve heard.
评论 #24640235 未加载
评论 #24640186 未加载
lxgrover 4 years ago
Does the T2 have any secure storage like the A12 and newer, or are all boot ROM exploits essentially unpatchable? And do we know if this specific exploit is a boot ROM exploit?
评论 #24637480 未加载
bilegeekover 4 years ago
Given that T2 is basically and ARM processor + other stuff, I wonder if it&#x27;s possible to have a separate dump kernel, like OpenVMS. Some watchdog that runs on the chip, and either gracefully shuts down or handles a kernel crash.
iamcapsover 4 years ago
So as I recently got a Mac from a guy and he don’t remember the password and I’m stuck on activation lock should I keep it or should I sell it or throw it ! Thanks a lot
poslix97over 4 years ago
Bottom line, can you use this exploit to read the user data on a recent (2019+) iPhone or MacBook if you have possession of the device and it&#x27;s locked? Yes or no?
neycodaover 4 years ago
The only way to truly secure something is to make it inaccessible. You can&#x27;t pick the lock of a door if it&#x27;s a wall, you know.
headmeltedover 4 years ago
Great day to be Apple I guess.<p>I imagine there’s no better incentive to get people to move en masse to your new architecture than an exploit for your old architecture that completely and irreparably breaks its security model showing up weeks before it’s released.
评论 #24638768 未加载
gigatexalover 4 years ago
how quickly will they patch this now is my question
评论 #24637266 未加载
评论 #24637279 未加载
fit2ruleover 4 years ago
And so the futility of captured computing continues. I would love to write software for the Touch Bar that runs when I shut the MacBook down .. it&#x27;d be quite useful for some things, I imagine - such as using it for a remote control for other equipment I own.
评论 #24637273 未加载
neximo64over 4 years ago
There are so many ads on this site
评论 #24636411 未加载
评论 #24636323 未加载
评论 #24636286 未加载
person_of_colorover 4 years ago
Its clear that bootROM is not the way forward.
评论 #24637483 未加载