Apple T2 Analysis
2020-10-09 01:00:11 Author: www.reddit.com(查看原文) 阅读量:196 收藏

I’ve been questioning the “sky is falling” mentality around this for a while. First, no proof of any persistence of the exploit, which severely limits what can be gained through this. Second, it requires direct physical access, which is an open vulnerability for any hardware. The actual impact of this seems otherwise minimal, and certainly not something the average person needs to worry about. Is it a problem? Yeah, definitely, but not something I’d lose sleep on.


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/j6ppwi/apple_t2_analysis/
如有侵权请联系:admin#unsafe.sh