|Secure boot in the era of the T2|
|By Thom Holwerda on 2018-11-22 00:10:44|
Enabled by the T2 chipset, new generations of the Macbook Pro and the iMac Pro aim to mitigate many software and hardware-based attacks against the very first pieces of code executed during the initial boot process. By ditching the flash memory chip containing Unified Extensible Firmware Interface (UEFI) firmware and using chipset functionality typically reserved for server architectures, the T2 is able to dynamically provide and validate UEFI payload contents at runtime.
We have spent considerable time looking at the T2 and have written a paper that outlines the technical details of what actually happens when the power button is pressed. The T2 is a great first step in the right direction, but there is still room for improvement when it comes to the secure boot process on an Apple T2-enabled device.
Security at the expense of user ownership and repairability. Pick your poison.
- iSH: an iOS Linux shell for your iPhone or iPad - 2018-11-12
- Apple walks Ars through the iPad Pro's A12X - 2018-11-08
- Apple blocks Linux on new Macs with T2 security chips - 2018-11-05
- Apple raises prices, and profits keep booming - 2018-11-02
- More related articles