Hacker Newsnew | past | comments | ask | show | jobs | submitlogin



The reasoning there is far from conclusive. The argument is that the secure enclave has been updated in the past (to lengthen enforced delays) without wiping user keys.

However, without more information, this does not tell us whether it is possible in this case. The obvious implementation for a secure enclave resisting this sort of attack is to only allow key-preserving updates when already in unlocked state (which would be the case for any normal user update). All other cases should destroy the user keymat, even if the update is validly signed by Apple. This would be done by the hardware and/or previous firmware before it loaded the new firmware so you can't create an update that bypasses this step.

If this isn't how the secure enclave works now, I'll bet it will be in the next version (or update if possible).


You can't update the firmware on the SE without unlocking the device first.


We assume.

I'm also confused by a lot of this since don't you need the password anyway to upgrade?


> We assume.

I bet if Apple is forced to comply with this order they will make sure that they will find a way to design the iPhone such that they physically can't comply with similar requests in the future.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: