TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

New vuln in Apple M-series allowing secret keys extraction can't be patched

199 pointsby A_No_Name_Mouseabout 1 year ago

18 comments

tombotabout 1 year ago
Actual article <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2024&#x2F;03&#x2F;hackers-can-extract-secret-encryption-keys-from-apples-mac-chips&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2024&#x2F;03&#x2F;hackers-can-extract...</a>
评论 #39789013 未加载
switch007about 1 year ago
Google, in 2021 [0]:<p>&gt; While the PoC demonstrates the JavaScript Spectre attack against Chrome 88&#x27;s V8 JavaScript engine on an Intel Core i7-6500U &#x27;Skylake&#x27; CPU on Linux, Google notes it can easily be tweaked for other CPUs... It was even successful on Apple&#x27;s M1 Arm CPU...<p>And Augury [1] in 2022 also affected Apple&#x27;s A14 and M1 chips.<p>So have Apple been attempting to mitigate and failing, or ignoring the issue?<p>Surely chip manufactures can&#x27;t keep ignoring these fundamental flaws<p>[0] <a href="https:&#x2F;&#x2F;security.googleblog.com&#x2F;2021&#x2F;03&#x2F;a-spectre-proof-of-concept-for-spectre.html" rel="nofollow">https:&#x2F;&#x2F;security.googleblog.com&#x2F;2021&#x2F;03&#x2F;a-spectre-proof-of-c...</a><p>[1] <a href="https:&#x2F;&#x2F;www.prefetchers.info&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.prefetchers.info&#x2F;</a>
评论 #39790269 未加载
camkegoabout 1 year ago
The title to article ...&quot;secret keys&quot;... had me thinking that this vuln might be a path to extracting the private keys from the secure enclave.<p>I&#x27;m not sure, but after a bit more reading, it sounds like private-keys or symmetric-keys can be extracted from other user-space or possibly kernel-space code execution. And NOT from the secure enclave.<p>Just for what it&#x27;s worth.
评论 #39793103 未加载
nijaruabout 1 year ago
Discussed here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=39779195">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=39779195</a>
planbabout 1 year ago
Unfortunately, I don&#x27;t think the real world applications of this exploit are explained anywhere. From skimming the paper , it looks like the attacker needs to be able to a) run code on the victim&#x27;s machine and b) trigger the encryption process (&quot;For our cryptographic attacks, we assume the attacker runs unprivileged code and is able to interact with the victim via nominal software interfaces, triggering it to perform private key operations.&quot;)<p>So for a) it might be sufficient to run javascript and for b) of course there are ways to inject data into server processes, processing data submitted by clients is what servers are for.<p>But a happens on clients (web browsers) and b would be a way to extract encryption keys from servers. But in what case can an attacker run code on a machine where they can also trigger the encryption (constantly for an hour like in the demonstration)? The only thing that comes to my mind would be a server side code-execution-sandbox that runs SSL termination on the same machine.<p>edit: Maybe stealing client certificate keys?
评论 #39792099 未加载
评论 #39797549 未加载
1vuio0pswjnm7about 1 year ago
Actual paper:<p><a href="https:&#x2F;&#x2F;gofetch.fail&#x2F;files&#x2F;gofetch.pdf" rel="nofollow">https:&#x2F;&#x2F;gofetch.fail&#x2F;files&#x2F;gofetch.pdf</a>
resource_wasteabout 1 year ago
Wow, didn&#x27;t this happen with Intel? I think that was a noticeable drop in performance.<p>This is probably worse given people were trying to experiment with local LLMs on CPU. Its not like they even offer Nvidia.
评论 #39789842 未加载
dmitrygrabout 1 year ago
Clickbait. How can someone lacking the real docs for the CPU claim that this “can’t be patched”? How could they possibly know what chicken bits exist to disable what features?
评论 #39792170 未加载
评论 #39791107 未加载
ChrisArchitectabout 1 year ago
[dupe]<p>Discussion on the actual vulnerability post: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=39779195">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=39779195</a>
ryandvmabout 1 year ago
Sweet. Wonder if this opens the door a DeCSS-style hack for open source iMessage clients?
Mortifferabout 1 year ago
some people&#x27;s real world take <a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;MacOS&#x2F;comments&#x2F;1bkd3m4&#x2F;unpatchable_vulnerability_in_apple_chip_leaks&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;MacOS&#x2F;comments&#x2F;1bkd3m4&#x2F;unpatchable_...</a>
boesboesabout 1 year ago
Another day, another speculative execution vuln.. IMHO: all this speculation is a local maximum and it show we have fundamental issue with how we design &#x27;computers&#x27;
评论 #39789504 未加载
bluetomcatabout 1 year ago
Now looking for an affordable M3 Max MBP that should cost less than my car :-)
评论 #39789172 未加载
评论 #39789825 未加载
midtakeabout 1 year ago
&gt; The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future.<p>Are we nearing any sort of consensus that any form of speculation is bad? Is there a fundamentally secure way to do it?
评论 #39788950 未加载
评论 #39788918 未加载
评论 #39788977 未加载
评论 #39788923 未加载
评论 #39788963 未加载
评论 #39790385 未加载
评论 #39788861 未加载
评论 #39789087 未加载
评论 #39789843 未加载
评论 #39789053 未加载
okokwhateverabout 1 year ago
As usual nobody cares about the &quot;Average users&quot;. This is a flaw, this is a very high risk issue for everyone and should be threaded as a big problem by Apple but as the &quot;average user&quot; is not important anymore...
评论 #39790127 未加载
VeejayRampayabout 1 year ago
if this is confirmed I&#x27;m really interested into how exactly Apple will somehow deflect this and make it vanish like they somehow always manage to do with the myriad of issues they&#x27;re facing over and over
评论 #39788862 未加载
评论 #39788784 未加载
评论 #39788872 未加载
igtztorreroabout 1 year ago
I&#x27;m sure Apple will provide a patch in the next few days. Mr Tim Cook will take care of the share price.
xpuenteabout 1 year ago
Security through obscurity is really a bad idea, and Apple is no exception. In the long run, this will likely drive the adoption of RiscV as a better alternative.
评论 #39789635 未加载
评论 #39789672 未加载
评论 #39789856 未加载