▲ | strcat 3 days ago | ||||||||||||||||||||||||||||||||||
The side channel fixes and new MTE instruction features are not specific to Apple. Apple's blog post has some significant misleading claims and omissions. It's marketing material, not a true technical post without massive bias. It's aimed at putting down the existing deployments of MTE, hyping up what they've done and even downplaying the factually widespread exploits of Apple devices which are proven to be happening. If they're not aware of how widespread the exploits of their devices are including by low level law enforcement with widely available tools, that's quite strange. | |||||||||||||||||||||||||||||||||||
▲ | tptacek 3 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
I think you have to read "widespread malware attack" in Apple lit as a term of art; it's a part of the corporate identity dating back to the inception of the iPhone and (I think maybe) ties into some policy stuff that is very salient to them right now. I think SEAR is extremely aware of what real-world exploitation of iPhones looks like. You were never going to get their unfiltered take in a public blog post like this, though. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
▲ | saagarjha 3 days ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
The choices they made are novel to my understanding. |