Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not aware of anyone being able to patch the Secure Enclave code to date.


there are public exploits to patch secure enclave code for some of the checkra1n devices. pongoOS uses the blackbird exploit on some models to remove a check that disables access to user data if the SEPOS boot code determines the phone has been DFU booted by checking the hardware TRNG state. https://github.com/checkra1n/PongoOS/blob/master/src/drivers...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: