The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "T8012 checkm8"
Line 1: | Line 1: | ||
{{DISPLAYTITLE:t8012 checkm8}} |
{{DISPLAYTITLE:t8012 checkm8}} |
||
+ | The least imaginative team name... |
||
+ | |||
'''t8012 checkm8''' is a team of who have applied the [[checkm8]] vulnerability to the [[t8012]] or "T2" security processor on modern Mac computers. |
'''t8012 checkm8''' is a team of who have applied the [[checkm8]] vulnerability to the [[t8012]] or "T2" security processor on modern Mac computers. |
||
Revision as of 05:28, 17 May 2020
The least imaginative team name...
t8012 checkm8 is a team of who have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.
Work
- Checkm8 port to the T2 processor [1]
- T2 restore using libimobiledevice [2]
- USB Target Disk Mode
- Apple SMC Firmware Reverse Engineering
- Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware