The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "T8012 checkm8"
Line 11: | Line 11: | ||
== Official Members == |
== Official Members == |
||
*[[User:h0m3us3r|h0m3us3r]] |
*[[User:h0m3us3r|h0m3us3r]] |
||
− | *[[User: |
+ | *[[User:aunali1|aunali1]] |
*[[User:mrarm|mrarm]] |
*[[User:mrarm|mrarm]] |
||
*[[User:rickmark|rickmark]] |
*[[User:rickmark|rickmark]] |
Revision as of 18:55, 15 May 2020
t8012 checkm8 is a team of who have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.
Work
- Checkm8 port to the T2 processor [1]
- T2 restore using libimobiledevice [2]
- USB Target Disk Mode
- Apple SMC Firmware Reverse Engineering
- Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware