{"id":216134,"date":"2024-03-22T17:57:31","date_gmt":"2024-03-22T17:57:31","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/22\/apple-silicon-has-a-hardware-level-exploit-that-could-leak-private-data\/"},"modified":"2025-06-25T17:20:07","modified_gmt":"2025-06-25T17:20:07","slug":"apple-silicon-has-a-hardware-level-exploit-that-could-leak-private-data","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/22\/apple-silicon-has-a-hardware-level-exploit-that-could-leak-private-data\/","title":{"rendered":"Apple Silicon has a hardware-level exploit that could leak private data"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p>A team of university security researchers has found a chip-level exploit in <a data-i13n=\"cpos:1;pos:1\" href=\"https:\/\/www.engadget.com\/macbook-air-m3-review-2024-13-15-inch-140053162.html\" data-ylk=\"slk:Apple Silicon Macs;cpos:1;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">Apple Silicon Macs<\/a>. The group <a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:2;pos:1\" class=\"link \" href=\"https:\/\/gofetch.fail\/files\/gofetch.pdf\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:says;elm:context_link;elmt:doNotAffiliate;cpos:2;pos:1;itc:0;sec:content-canvas\">says<\/a> the flaw can bypass the computer\u2019s encryption and access its security keys, exposing the Mac\u2019s private data to hackers. The silver lining is the exploit would require you to circumvent <a data-i13n=\"cpos:3;pos:1\" href=\"https:\/\/www.engadget.com\/apple-gatekeeper-privacy-macos-security-104715012.html\" data-ylk=\"slk:Apple\u2019s Gatekeeper protections;cpos:3;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">Apple\u2019s Gatekeeper protections<\/a>, install a malicious app and then let the software run for as long as 10 hours (along with a host of other complex conditions), which reduces the odds you\u2019ll have to worry about the threat in the real world.<\/p>\n<p>The exploit originates in a part of Apple\u2019s M-series chips called Data Memory-Dependent Prefetchers (DMPs). DMPs make the processors more efficient by preemptively caching data. The DMPs treat data patterns as directions, using them to guess what information they need to access next. This reduces turnarounds and helps lead to reactions like \u201cseriously fast,\u201d often <a data-i13n=\"cpos:4;pos:1\" href=\"https:\/\/www.engadget.com\/apple-m1-upscaled-133046858.html\" data-ylk=\"slk:used to describe Apple Silicon;cpos:4;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">used to describe Apple Silicon<\/a>.<\/p>\n<p>The researchers discovered that attackers can use the DMP to bypass encryption. \u201cThrough new reverse engineering, we find that the DMP activates on behalf of potentially any program, and attempts to dereference any data brought into cache that resembles a pointer,\u201d the researchers wrote. (\u201cPointers\u201d are addresses or directions signaling where to find specific data.) \u201cThis behavior places a significant amount of program data at risk.\u201d<\/p>\n<p>\u201cThis paper shows that the security threat from DMPs is significantly worse than previously thought and demonstrates the first end-to-end attacks on security-critical software using the Apple m-series DMP,\u201d the group wrote.<\/p>\n<p>The researchers named the attack GoFetch, and they created an app that can access a Mac\u2019s secure data without even requiring root access. <em>Ars Technica<\/em> Security Editor Dan Goodin <a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:5;pos:1\" class=\"link \" href=\"https:\/\/arstechnica.com\/security\/2024\/03\/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:explains;elm:context_link;elmt:doNotAffiliate;cpos:5;pos:1;itc:0;sec:content-canvas\">explains<\/a>, \u201cM-series chips are divided into what are known as clusters. The M1, for example, has two clusters: one containing four efficiency cores and the other four performance cores. As long as the GoFetch app and the targeted cryptography app are running on the same performance cluster\u2014even when on separate cores within that cluster \u2014 GoFetch can mine enough secrets to leak a secret key.\u201d<\/p>\n<p>The details are highly technical, but <a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:6;pos:1\" class=\"link \" href=\"https:\/\/arstechnica.com\/security\/2024\/03\/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:Ars Technica\u2019s write-up;elm:context_link;elmt:doNotAffiliate;cpos:6;pos:1;itc:0;sec:content-canvas\"><em>Ars Technica\u2019s write-up<\/em><\/a> is worth a read if you want to venture much further into the weeds.<\/p>\n<p>But there are two key takeaways for the layperson: Apple can\u2019t do much to fix existing chips with software updates (at least without significantly slowing down <a data-i13n=\"cpos:7;pos:1\" href=\"https:\/\/www.engadget.com\/apples-m3-chips-pro-max-003004080.html\" data-ylk=\"slk:Apple Silicon\u2019s trademark performance;cpos:7;pos:1;elm:context_link;itc:0;sec:content-canvas\" class=\"link \">Apple Silicon\u2019s trademark performance<\/a>), and as long as you have Apple\u2019s Gatekeeper turned on (the default), you won\u2019t likely install malicious apps in the first place. Gatekeeper only allows apps from the Mac App Store and non-App Store installations from Apple registered developers. (You may want to be extra cautious when manually approving apps from unregistered developers in macOS security settings.) If you don\u2019t install malicious apps outside those confines, the odds appear quite low this will ever affect your M-series Mac.<\/p>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.engadget.com\/apple-silicon-has-a-hardware-level-exploit-that-could-leak-private-data-174741269.html?src=rss\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] A team of university security researchers has found a chip-level exploit in Apple Silicon Macs. The group says the flaw can bypass the computer\u2019s<\/p>\n","protected":false},"author":1,"featured_media":216135,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[159],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/216134"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=216134"}],"version-history":[{"count":1,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/216134\/revisions"}],"predecessor-version":[{"id":334896,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/216134\/revisions\/334896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/216135"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=216134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=216134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=216134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}