www. O S N E W S .com
News Features Interviews
BlogContact Editorials

Secure boot in the era of the T2
By Thom Holwerda on 2018-11-22 00:10:44

Enabled by the T2 chipset, new generations of the Macbook Pro and the iMac Pro aim to mitigate many software and hardware-based attacks against the very first pieces of code executed during the initial boot process. By ditching the flash memory chip containing Unified Extensible Firmware Interface (UEFI) firmware and using chipset functionality typically reserved for server architectures, the T2 is able to dynamically provide and validate UEFI payload contents at runtime.

We have spent considerable time looking at the T2 and have written a paper that outlines the technical details of what actually happens when the power button is pressed. The T2 is a great first step in the right direction, but there is still room for improvement when it comes to the secure boot process on an Apple T2-enabled device.

Security at the expense of user ownership and repairability. Pick your poison.

12  Comments - Printer friendly - Related stories
Recent related stories
- Dayna MacCharlie - 2018-11-24
- iSH: an iOS Linux shell for your iPhone or iPad - 2018-11-12
- Apple walks Ars through the iPad Pro's A12X - 2018-11-08
- Apple blocks Linux on new Macs with T2 security chips - 2018-11-05
- Apple raises prices, and profits keep booming - 2018-11-02
- More related articles
 

Tell a friend
Your full name:
Your email address:
Your friend's email:
Anti-spam measure:
5+2=

News Features Interviews
BlogContact Editorials


WAP site - RSS feed
© OSNews LLC 1997-2007. All Rights Reserved.
The readers' comments are owned and a responsibility of whoever posted them.
Prefer the desktop version of OSNews?