The Apple M1 PACMAN vulnerability.

The Apple M1 PACMAN vulnerability.

Mental Outlaw

2 года назад

169,166 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

SOULY SOULY
SOULY SOULY - 16.08.2022 10:42

I was at ISCA 2022 where they presented the paper and it was unanimously considered to be the best presentation of all the computer security ones, it was a really fun experience.

Ответить
Dillan Armanii
Dillan Armanii - 10.08.2022 00:16

I was going to grab a new m2 Mac. Not sure if they did any studies on the new chip

Ответить
leande 🇺🇦
leande 🇺🇦 - 15.07.2022 20:22

When something goes wrong, 99% of the time it happens because of pointers

Ответить
Mayank Malik
Mayank Malik - 07.07.2022 06:40

So.... it's like canaries in linux executables, but on hardware level?

Ответить
MrAdvantage1
MrAdvantage1 - 06.07.2022 05:43

It’s Pac MA’AM

Ответить
Thomas Riley
Thomas Riley - 01.07.2022 05:43

Why is Satania always used as an anti-apple mascot when she literally has an iphone?

Ответить
Dave V
Dave V - 27.06.2022 17:45

Cute anime girl and tech? Yea, I'm your perfectly targeted audience.

Ответить
Crashdump Segfaultovich
Crashdump Segfaultovich - 26.06.2022 14:43

Great content, sir. Keep doing the needful.

Ответить
the memescape
the memescape - 26.06.2022 11:04

Checkmate apple, Android NUMBA ONE!

Ответить
Jelly Bomb
Jelly Bomb - 24.06.2022 16:06

Hi. When a noun starts with a vowel sound, the pronunciation of the definite article is the same as most every time you say it in this video. That is, it sounds like "thee." However, when the noun starts with a consonant sound, such as in "pointer" or "variable," the definite article is pronounced "thuh." If it's confusing, you can use this trick: Just use the indefinite article for the noun, and then remember that if the indefinite article is "an," the definite article is pronounced "thee," but if it's "a," it's pronounced "thuh." It helped me when I started out learning English. Cheers, and thanks for the video 😊

Ответить
darfjono
darfjono - 24.06.2022 12:28

so they found the cia backdoor

Ответить
LeviHB
LeviHB - 23.06.2022 22:41

16 bits would never sound good enough anyway? I mean if you manage to do that in some JS, you could easily hit millions of people and get some of them just by pure luck?

Ответить
The Duke Belmondo
The Duke Belmondo - 23.06.2022 22:20

I lost it at the CSS lol

Ответить
Rediblackdragon
Rediblackdragon - 23.06.2022 21:49

Pure Advantage Camel Munches All Noobs?

Ответить
Julvia Linares
Julvia Linares - 23.06.2022 20:51

Yeah I could put them m1 mac

Ответить
Cornflakes
Cornflakes - 23.06.2022 02:30

What about M2?

Ответить
Alejandro Alzate Sánchez
Alejandro Alzate Sánchez - 22.06.2022 21:34

"Security that is iPhone."
this video: *HARD METAL LAUGH*

Ответить
FROZEN FRIDGE
FROZEN FRIDGE - 22.06.2022 06:30

lol just dropped 3k on one

Ответить
You're a piece of sh!t that deserves to die.
You're a piece of sh!t that deserves to die. - 22.06.2022 04:29

The gist I get from this is that Apple computers with an M1 chip are now as vulnerable as the average windows computer.

Ответить
Aston Rose
Aston Rose - 22.06.2022 00:03

Is this also applicable to m1 max and m1 pro chips btw?

Ответить
Tony
Tony - 21.06.2022 23:53

What does a $3,500 alto have? 64GB of ram & 4TB SSD?

Ответить
Veso266
Veso266 - 21.06.2022 23:14

I feal bad for people developing/researching pointer protection, because years of their hard work are rendered useless because of someone that likes to break what you do (procesors are now like they had no pointer protection in the first place)

Its like you buy some land, plant trees, and build a beautiful house on it with your hard earned money and years of work and someday the goverment decides to take it all away from you because someone wanted to build a highway there....

Ответить
arthur venger
arthur venger - 21.06.2022 22:50

im unhackable, cause apple is so smart

Ответить
derickito
derickito - 21.06.2022 20:23

I wonder if the M2 will also have this vulnerability

Ответить
TiZUrl
TiZUrl - 21.06.2022 19:17

does this vulnerability affect m1 ipads too?

Ответить
Supervisor
Supervisor - 21.06.2022 18:38

If it attacks the security thancwhere can i get infected with this. It might be the way i will install linux on my mac

Ответить
Jahquantee Johnson
Jahquantee Johnson - 21.06.2022 18:17

What has been Apple’s response?

Ответить
SikoMC
SikoMC - 21.06.2022 18:14

the new m2 chip is coming soon!
- less power consumption then ever!
- faster then any x86 chip !
- all failures from m1...uhm.. FEATURES are included !
- and of course, as you safe money from powercosumption this new macbook pro with the m2 chip will only cost you $3'500.-
(if you experience battery and / or any display problems, our 5* customer service will gladly sell you our newest model of the series!)

Ответить
sjjdhdbdsbsb
sjjdhdbdsbsb - 21.06.2022 15:46

trol

Ответить
Forzamon
Forzamon - 21.06.2022 09:50

What do you think is gonna happen first? Apple is gonna fix the issue or Bandai Namco is gonna copyright claim the dipshit who found the exploit. Personally, I hope both happen.

Ответить
Nitro Zeus
Nitro Zeus - 21.06.2022 07:11

Nice

Ответить
Norbert K.
Norbert K. - 21.06.2022 00:23

All hardware has vulnerabilities this is normal stuff nowadays and often it's in the processor or on the motherboard. In the other hand it sounded a bit more complicated than exploiting for example Intel's management engine "feature" or maybe it just sounded complicated to me.

Ответить
Godnyx
Godnyx - 20.06.2022 21:03

"It is the name of an excellent package manager on Arch based Linux distributions"

Imo, the best package manager ever!

Ответить
Ben L. Jackson
Ben L. Jackson - 20.06.2022 20:50

65 thousand keys seems lazy as hell, 64-bit chips can crunch AES-256 most of the time so they could have used trillions of keys. It seems like Apple didn't want to lock it down too well or they cheaped out on the hardware.

Ответить
AdManOfChaos
AdManOfChaos - 20.06.2022 16:30

Two questions…
One: does this affect the iPad Pro? From what I’ve seen, it seems like a conversation about this largely revolves around macOS.
Two: this video helped, but I’m also not that great with the subject matter. It is a vulnerability, and it could give someone for control. What is the probability of this happening? Should I be worried? Or in spite of this vulnerability existing, is it really really hard for someone to pull off (on either iPadOS or macOS)?

Ответить
Yumemi
Yumemi - 20.06.2022 15:53

the part where it shows pacman's feet was so hot...

Ответить
Himalayo
Himalayo - 20.06.2022 13:50

Pointer Authentication Code My Ass, Ni-

Ответить
AxA12
AxA12 - 20.06.2022 13:17

why is satania there lol

Ответить
Ultra Low Spekken
Ultra Low Spekken - 20.06.2022 12:51

Lost chance to name this exploit the Pac-Mac... Or the Mac-Man.

Ответить
Vegan Life
Vegan Life - 20.06.2022 11:53

LOLOLOLOL thats what crapple fans get

Ответить
MarcoLoves360gamer
MarcoLoves360gamer - 20.06.2022 10:25

Can this be used to install windows or linux?

Ответить
John Forde
John Forde - 20.06.2022 09:52

Easy way around this is don't use C or C++ to write programs. Easy.

Ответить
Vanex Villas
Vanex Villas - 20.06.2022 07:43

This is why windows is always better

Ответить
Mr. Fuffey Guy
Mr. Fuffey Guy - 20.06.2022 02:51

The reason why people use MacBooks think that they're "unhackable" is because most hacks are designed to take advantage of windows not Mac since Windows has such a high user base and Mac is a lot lower (although it is growing now).
Edit: does this affect M2 he never specified, he only said M1 so I'm not exactly sure

Ответить
Ford Prefect
Ford Prefect - 20.06.2022 01:31

I literally got an intel macbook right before the m1 hit the shelves for cheaper. Now I feel a bit less dumb for not waiting. Still have to worry about the intel management engine though.

Ответить
FennecTECH
FennecTECH - 19.06.2022 23:33

WHOO. PACMAN JAILBREAK INCOMMING

Ответить
amalliar
amalliar - 19.06.2022 22:54

void * LOL

Ответить
Clay TheBot
Clay TheBot - 19.06.2022 21:20

If only there was a way to publicly make your technology available for testing by all the smart people in the world before it's used by the public.

Ответить
Félix A.G
Félix A.G - 19.06.2022 19:45

👍

Ответить
Aurora Wright
Aurora Wright - 19.06.2022 16:04

Video makes it sound like you can escalate privileges from user to kernel with this vulnerability but that's not the case, this just bypasses one of several mitigations that you (as an attacker) need to bypass if you already have an exploitable kernel bug

Ответить