Комментарии:
I was at ISCA 2022 where they presented the paper and it was unanimously considered to be the best presentation of all the computer security ones, it was a really fun experience.
ОтветитьI was going to grab a new m2 Mac. Not sure if they did any studies on the new chip
ОтветитьWhen something goes wrong, 99% of the time it happens because of pointers
ОтветитьSo.... it's like canaries in linux executables, but on hardware level?
ОтветитьIt’s Pac MA’AM
ОтветитьWhy is Satania always used as an anti-apple mascot when she literally has an iphone?
ОтветитьCute anime girl and tech? Yea, I'm your perfectly targeted audience.
ОтветитьGreat content, sir. Keep doing the needful.
ОтветитьCheckmate apple, Android NUMBA ONE!
ОтветитьHi. When a noun starts with a vowel sound, the pronunciation of the definite article is the same as most every time you say it in this video. That is, it sounds like "thee." However, when the noun starts with a consonant sound, such as in "pointer" or "variable," the definite article is pronounced "thuh." If it's confusing, you can use this trick: Just use the indefinite article for the noun, and then remember that if the indefinite article is "an," the definite article is pronounced "thee," but if it's "a," it's pronounced "thuh." It helped me when I started out learning English. Cheers, and thanks for the video 😊
Ответитьso they found the cia backdoor
Ответить16 bits would never sound good enough anyway? I mean if you manage to do that in some JS, you could easily hit millions of people and get some of them just by pure luck?
ОтветитьI lost it at the CSS lol
ОтветитьPure Advantage Camel Munches All Noobs?
ОтветитьYeah I could put them m1 mac
ОтветитьWhat about M2?
Ответить"Security that is iPhone."
this video: *HARD METAL LAUGH*
lol just dropped 3k on one
ОтветитьThe gist I get from this is that Apple computers with an M1 chip are now as vulnerable as the average windows computer.
ОтветитьIs this also applicable to m1 max and m1 pro chips btw?
ОтветитьWhat does a $3,500 alto have? 64GB of ram & 4TB SSD?
ОтветитьI feal bad for people developing/researching pointer protection, because years of their hard work are rendered useless because of someone that likes to break what you do (procesors are now like they had no pointer protection in the first place)
Its like you buy some land, plant trees, and build a beautiful house on it with your hard earned money and years of work and someday the goverment decides to take it all away from you because someone wanted to build a highway there....
im unhackable, cause apple is so smart
ОтветитьI wonder if the M2 will also have this vulnerability
Ответитьdoes this vulnerability affect m1 ipads too?
ОтветитьIf it attacks the security thancwhere can i get infected with this. It might be the way i will install linux on my mac
ОтветитьWhat has been Apple’s response?
Ответитьthe new m2 chip is coming soon!
- less power consumption then ever!
- faster then any x86 chip !
- all failures from m1...uhm.. FEATURES are included !
- and of course, as you safe money from powercosumption this new macbook pro with the m2 chip will only cost you $3'500.-
(if you experience battery and / or any display problems, our 5* customer service will gladly sell you our newest model of the series!)
trol
ОтветитьWhat do you think is gonna happen first? Apple is gonna fix the issue or Bandai Namco is gonna copyright claim the dipshit who found the exploit. Personally, I hope both happen.
ОтветитьNice
ОтветитьAll hardware has vulnerabilities this is normal stuff nowadays and often it's in the processor or on the motherboard. In the other hand it sounded a bit more complicated than exploiting for example Intel's management engine "feature" or maybe it just sounded complicated to me.
Ответить"It is the name of an excellent package manager on Arch based Linux distributions"
Imo, the best package manager ever!
65 thousand keys seems lazy as hell, 64-bit chips can crunch AES-256 most of the time so they could have used trillions of keys. It seems like Apple didn't want to lock it down too well or they cheaped out on the hardware.
ОтветитьTwo questions…
One: does this affect the iPad Pro? From what I’ve seen, it seems like a conversation about this largely revolves around macOS.
Two: this video helped, but I’m also not that great with the subject matter. It is a vulnerability, and it could give someone for control. What is the probability of this happening? Should I be worried? Or in spite of this vulnerability existing, is it really really hard for someone to pull off (on either iPadOS or macOS)?
the part where it shows pacman's feet was so hot...
ОтветитьPointer Authentication Code My Ass, Ni-
Ответитьwhy is satania there lol
ОтветитьLost chance to name this exploit the Pac-Mac... Or the Mac-Man.
ОтветитьLOLOLOLOL thats what crapple fans get
ОтветитьCan this be used to install windows or linux?
ОтветитьEasy way around this is don't use C or C++ to write programs. Easy.
ОтветитьThis is why windows is always better
ОтветитьThe reason why people use MacBooks think that they're "unhackable" is because most hacks are designed to take advantage of windows not Mac since Windows has such a high user base and Mac is a lot lower (although it is growing now).
Edit: does this affect M2 he never specified, he only said M1 so I'm not exactly sure
I literally got an intel macbook right before the m1 hit the shelves for cheaper. Now I feel a bit less dumb for not waiting. Still have to worry about the intel management engine though.
ОтветитьWHOO. PACMAN JAILBREAK INCOMMING
Ответитьvoid * LOL
ОтветитьIf only there was a way to publicly make your technology available for testing by all the smart people in the world before it's used by the public.
Ответить👍
ОтветитьVideo makes it sound like you can escalate privileges from user to kernel with this vulnerability but that's not the case, this just bypasses one of several mitigations that you (as an attacker) need to bypass if you already have an exploitable kernel bug
Ответить