The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "T8012 checkm8"
(→Work) |
|||
Line 6: | Line 6: | ||
* T2 restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b] |
* T2 restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b] |
||
* [[USB Target Disk Mode]] |
* [[USB Target Disk Mode]] |
||
+ | * Apple SMC Firmware Reverse Engineering |
||
== Official Members == |
== Official Members == |
Revision as of 05:13, 14 May 2020
t8012 checkm8 is a team of who have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.
Work
- Checkm8 port to the T2 processor [1]
- T2 restore using libimobiledevice [2]
- USB Target Disk Mode
- Apple SMC Firmware Reverse Engineering