TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Apple Silicon vulnerability leaks encryption keys, and can't be patched easily

48 点作者 hotdailys大约 1 年前

5 条评论

consumer451大约 1 年前
This is a summary of the Ars reporting [0] on the original research [1].<p>[0] <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2024&#x2F;03&#x2F;hackers-can-extract-secret-encryption-keys-from-apples-mac-chips&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2024&#x2F;03&#x2F;hackers-can-extract...</a><p>[1] <a href="https:&#x2F;&#x2F;gofetch.fail&#x2F;" rel="nofollow">https:&#x2F;&#x2F;gofetch.fail&#x2F;</a>
pvg大约 1 年前
Recent thread: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=39779195">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=39779195</a>
heresie-dabord大约 1 年前
Apple experts, how subtle is this constraint for this exploit?<p>&gt; The GoFetch attack uses the same user privileges as many other third-party macOS apps, rather than root access. This lowers the barrier to entry for actually run the attack, but it&#x27;s not entirely the whole story.<p>&gt; The GoFetch app running the attack must also be used on the same chip cluster as the cryptographic target app in order to function, and both must use the efficiency cores or the performance cores at the same time.<p>= = = edit for additional context<p>&gt; The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. [...] DMPs are a relatively new phenomenon found only in M-series chips and Intel&#x27;s 13th-generation Raptor Lake microarchitecture
评论 #39802466 未加载
评论 #39800610 未加载
politician大约 1 年前
Will this result in a new tool to unlock confiscated iPhones?
评论 #39801684 未加载
评论 #39800328 未加载
ChrisArchitect大约 1 年前
[dupe]