The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "T8012 checkm8"
Line 17: | Line 17: | ||
*[[User:rickmark|rickmark]] |
*[[User:rickmark|rickmark]] |
||
+ | == Links == |
||
+ | * Website - https://t8012.dev |
||
+ | * Blog - https://blog.t8012.dev |
||
+ | * Twitter - https://twitter.com/t8012dev |
||
+ | * GitHub - https://github.com/t8012 |
||
[[Category:Hackers]] |
[[Category:Hackers]] |
Revision as of 05:13, 9 October 2020
The least imaginative team name...
t8012 checkm8 is a team of who have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.
Work
- Checkm8 port to the T2 processor [1]
- T2 restore using libimobiledevice [2]
- USB Target Disk Mode
- Apple SMC Firmware Reverse Engineering
- Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware
Official Members
Links
- Website - https://t8012.dev
- Blog - https://blog.t8012.dev
- Twitter - https://twitter.com/t8012dev
- GitHub - https://github.com/t8012