Facts ChronicleFacts Chronicle
  • Home
  • Games
  • Gadgets
  • Graphics Cards
  • How To
  • Automobiles
Search
© 2023 Facts Chronicle Company. All Rights Reserved.
Reading: T2 Jailbreak allows intruders to hack your Macbook and steal your private data
Share
Sign In
Notification Show More
Latest News
Rolex Replica Watches: The Perfect Blend of Style and Affordability
Tech Explained
Best Ceylon Cinnamon Supplements: A Comprehensive Review
Reviews
What to Do When Your Check Engine Light Is Blinking
Car Parts
Does ULTA Accept Apple Pay?
Apps
Kemps Cannabis: A Comprehensive Guide to the Popular Strain
Health
Aa
Facts ChronicleFacts Chronicle
Aa
  • About Us
  • Amazon affiliate disclosure
  • Privacy Policy
  • Scholarship
  • Terms Of Use
  • Contact Us
Search
Have an existing account? Sign In
Follow US
© 2022 Facts Chronicle. All Rights Reserved.
Facts Chronicle > Blog > News > T2 Jailbreak allows intruders to hack your Macbook and steal your private data
NewsTechnology

T2 Jailbreak allows intruders to hack your Macbook and steal your private data

Raamiz Naeem
Last updated: 2020/11/09 at 3:42 PM
Raamiz Naeem
Share
MacBook
techsoup.com
SHARE

Apple, one of the largest tech companies around, is no stranger to criticism. Arguably, this very characteristic propelled them to such lofty heights in the first place. Charismatic figures like Steve Jobs became well-known for their positive response to customer feedback. Thus, with each iteration of products becoming more user-friendly than the next.

However, one area where Apple has certainly struggled is user privacy and security. Although lapses in security might seem common, the exact scale of people affected by their Apple devices remains huge.

One moral grey area of hacking and exploiting Apple’s security was always the concept of ‘jailbreaking‘. This usually illegal but generally harmless practice involved users hacking through the iPhone’s security to access root control. The aim of this? To obtain apps, files, and features typically locked away behind the App Store’s paywall.

Apple long opposed this practice as violating their user agreement and terms of service, but every year the exploits remained easy. However, a recent finding by security firm IronPeak about Apple’s proprietary T2 security chipset may leave Macs worldwide at risk.

- Advertisement -

Hackers have discovered how to get into Macbook laptops using the same principles of jailbreaking

the initial series of jailbreaking generally relied on two hacking tools. These were informally called ‘Blackbird‘ and ‘Checkm8‘ by users involved in their invention. These two tools can let users overcome firewalls, gain control of the root directory, kernel and bypass the FileVault2 encryption. All that’s required? A simple, easily available debugging cable to use Checkm8 through. And to prevent the T2 chipset from ending the hack in fatal error, Blackbird overrides the decryption command. Thus, the user can circumvent both security measures and access the SEP (Secure Enclave Processor). That might sound like a bunch of nerdy jargon, but it means that all of your data is now compromised.

By installing a keylogger at the firmware level, the hacker gains options. They can either choose to then quickly transfer the desired data and leave. Or, even more alarmingly they can then leave the keylogger in to remotely access it later. That means that a hacked device can transmit personal data at any point, the owner unaware. Either way, the issue is not something that Apple can easily resolve, for a few reasons.

Because the exploit is rooted in the hardware itself, Apple cannot patch it out without a complete recall of products

As several security experts note, it seems unlikely Apple can do anything about existing devices. The problem comes from their Macbook’s OS, at the hardware level. Unfortunately, the only way to fix this would involve new hardware. That means either Apple replaces every post-2018 MacBook in the world, or fixes the T2 chip for later versions. The OS in question, with its glaring security hole, is the same as that on the iPhone A10 SoC. This means the basic problems carry over.

This entire vulnerability comes from a single opening in coding. The T2 debugging access interface, which normally comes sealed off, is completely ajar. So, potentially every MacBook since 2018 (when this particular chipset released) may come at a risk.

IronPeak warns that laptops handed over to authorities or left unattended may carry the most risk

The only way a hacker can compromise a Mac is by physically accessing it. Even then, they would need several minutes or longer to pull off the hack. So, the biggest window a hacker would have arrives when the owner leaves their device free. Even if its is for a security checkpost, caution is advised.

For more on the state of Apple, MacBooks and chips, stay tuned!

 

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Raamiz Naeem November 9, 2020
Share this Article
Facebook Twitter Copy Link Print
Share
By Raamiz Naeem
Follow:
Raamiz is an avid reader, writer, amateur singer, metalhead and full-time gamer.
Previous Article computer chip Engineers develop new revolutionary chip design for better AI computing
Next Article PS5 PS5 players discover that it is astonishingly missing a MAJOR key feature
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -

Disclosure: E-Commerce Content is independent of editorial content and we may receive compensation in connection with your purchase of products via links on this page.

Pages

  • Amazon Affiliate Disclosure
  • Factschronicle.com – Know the Future
  • Home
  • Scholarship
Facts ChronicleFacts Chronicle
Follow US

© 2023 Facts Chronicles. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?