TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Plug’nPwn – Connect to Jailbreak

168 pointsby clashmeifyoucanover 4 years ago

10 comments

mjg59over 4 years ago
(Comment copied over from another thread on this)<p>We generally assume that an attacker with physical access is going to win, but there are limits on that - the usual assumption is that it&#x27;s going to take some time, and potentially leave evidence that can be picked up with enough attention to detail (such as screws not being in precisely the same alignment). This attack violates all of that - there&#x27;s no physical modification of the machine, and it takes under a minute. That&#x27;s the difference between an attack where you know the machine has left your control for some time and an attack that can take place while you&#x27;re momentarily distracted.<p>The lack of response to this from Apple is deeply disappointing. The attack isn&#x27;t technically persistent - rebooting the T2 will clear it. But the T2 doesn&#x27;t reboot when the host OS does, and Apple haven&#x27;t published any guidance on how to guarantee that it has been (eg, does holding the power button down for long enough cut power to the T2? Does performing an SMC reset? Both seem to, but is that guaranteed to be the case if the T2 is running malicious code?). In addition, the Blackbird SEP exploit probably means that we have to assume that all secrets kept in the Secure Enclave can be stolen - but we don&#x27;t have a full enumeration of what those typically are, or what the total security impact of this is as a result.
spacedcowboyover 4 years ago
I suspect two things:<p>1) Apple will have a problem with this. They generally don’t care about small-scale things like hackintosh, but this is a bit different. Selling a device to automagically hack a key logger into a modern Mac goes over their ‘line in the sand’, I’d expect. Openly selling it is ... brave, IMHO.<p>2) I can see some further work on their part to beef up the security over usb-pd. Perhaps the first thing is, as the article suggests, to force external attention from the user (hold down both shift keys...) but ultimately I could see it going to challenge&#x2F;response and sha256 keys or similar.
评论 #24766024 未加载
评论 #24765907 未加载
评论 #24766494 未加载
评论 #24765770 未加载
评论 #24766882 未加载
评论 #24766176 未加载
zydecoover 4 years ago
Pre-T2 macs had eficheck to verify the EFI&#x27;s integrity, but with the T2 being so secure, it&#x27;s not necessary anymore: <a href="https:&#x2F;&#x2F;openradar.appspot.com&#x2F;radar?id=5020911870672896" rel="nofollow">https:&#x2F;&#x2F;openradar.appspot.com&#x2F;radar?id=5020911870672896</a>
评论 #24766403 未加载
irjustinover 4 years ago
I&#x27;m impressed with the engineering effort jailbreakers put into doing this.<p>And, Apple&#x27;s USB-C thunderbolt port... it&#x27;s the T1000 of ports.
评论 #24767427 未加载
Gaelanover 4 years ago
This isn&#x27;t persistent, right? At least on iPhones, checkra1n needs to run every boot to keep the device jailbroken. So if you saw the machine boot with nothing plugged in, you can trust it.
评论 #24765857 未加载
评论 #24767308 未加载
评论 #24766769 未加载
评论 #24766702 未加载
评论 #24766525 未加载
评论 #24766530 未加载
Kednicmaover 4 years ago
I like that they explicitly call on Apple to document the method of exploitation. Apple surely has internal documentation explaining how these debug commands work.
fulafelover 4 years ago
Interesting that Apple has been so successful in keeping technical docs out of leaks. (Or does anyone know of cases?)
评论 #24765997 未加载
评论 #24765943 未加载
评论 #24765953 未加载
评论 #24765843 未加载
mmastracover 4 years ago
I&#x27;m still waiting for a jailbreak dongle for iOS that would easily allow booting in a jailbroken state. I know bootm8 was working on a full case but that seems to have died. A similar, persistent project for macs would be awesome.
评论 #24767260 未加载
mschuster91over 4 years ago
&gt; This is because in Mac portables the keyboard is directly connected to the T2 and passed through to macOS.<p>Oh god please tell me this is a joke... what were they thinking? Seriously?!<p>Bad enough most Windows laptops run the keyboard through the EC, but at least nobody outside secret services attacks them and they are diverse, while everyone and their dog is picking at the T2 chip.
评论 #24766149 未加载
评论 #24766433 未加载
_qulrover 4 years ago
Has anyone noticed that this newer MacBook Pro clearly exhibits &quot;Staingate&quot; anti-reflecting coating peeling off the screen? (You can see it in the video.)
评论 #24765744 未加载