▲ | bri3d 6 days ago | ||||||||||||||||||||||||||||||||||
Keeping a victim device unlocked when the lock state is responsible for encryption key state is a totally legitimate risk. With that being said, I don’t think Apple see this specific part as a security critical component, because the calibration is not cryptographic and just sets some end point data. Apple are usually pretty good about using cryptography where they see real security boundaries. | |||||||||||||||||||||||||||||||||||
▲ | echelon 6 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
Don't invent reasons for Apple to continue to have a stranglehold over their monopoly of critical computing infrastructure. Companies as big as Apple and Google that provide such immensely important platforms and devices should have their hands tied by every major government's regulatory bodies to keep the hardware open for innovation without taxation and control. We've gone from open computing to serfdom in the last 20 years, and it's only getting worse as these companies pile on trillions after trillions of nation state equivalent market cap. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
▲ | arcticbull 6 days ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
It doesn't need to be encrypted if it's one-time programmable. The calibration data is likely written into efuses which are physically burned and cannot be reset. | |||||||||||||||||||||||||||||||||||
|