Comment by porphyra
2 days ago
There are also shops in China that will upgrade the SSD in a mac mini for cheaper and they will do all the work of the DFU restore etc.
2 days ago
There are also shops in China that will upgrade the SSD in a mac mini for cheaper and they will do all the work of the DFU restore etc.
But Jeff doesn't live in China.
Could such a place exist in the US or would Apple shut it down?
I think https://dosdude1.com/ provides such services? And his YouTube channel is a great place to start if you’re looking to DIY this: https://www.youtube.com/user/dosdude1
I think it could since a lot of shade tree iphone repair shops exist. Probably not enough demand to pay for the overhead unlike in china though.
And when the machine arrives back in the States, it even has a fresh CPC ROM soldered onto the back of the SOC!
I'm not a security researcher, but I get the distinct impression that Apple's hardware security is good enough that if you actually had an evil-maid attack on the M4 Pro Mac mini, it would instantly become the hottest news in the security community.
I would not be so sure that Apple's hardware security is good enough, taking into account that for several years it has been possible to take complete control remotely and undetectably over any iPhone, because of a combination of hardware and software bugs.
The Apple Mx CPUs had some secret test registers that allowed the bypassing of all hardware memory protections and which could be accessed by those who were aware of their existence, because they were not disabled after production, as they should have been. Combined with some software bugs in some Apple system libraries, this allowed an attacker to obtain privileged execution rights by sending an invisible message to the iPhone.
It is unknown whether the same secret test registers were also open in the laptop versions of the Apple Mx CPUs. There the invisible message attack route would have been unavailable, but malicious Web pages might have been able to use the same exploit.
This incredible security failure has been hot news for a couple of weeks, together with the long list of CVEs associated with it, and it has been also discussed on HN, but after that it has been quickly forgotten. Now most people still think that the Apple devices have good security, despite their history showing otherwise. I do not think that any other hardware vendor except Apple has been caught with a security bug so dumb as those unprotected hardware test registers.
This was not a theoretical security failure, but it was discovered because some unknown attackers had used it for a long time to spy on some iPhone owners. The attack had been discovered by studying the logs of WiFi access points, which had shown an unusually high outbound traffic coming from the iPhones, which were exfiltrating the acquired data.
4 replies →
It is mindboggling simple to override Apple MDM and device enrollment for MBPs. In a manner that is one and done, survives upgrades etc.
Two minutes or less, 4 DNS entries.
I'm a lot less convinced than you are of the hardiness of Apple's security.
2 replies →
Umm… what’s an evil-maid attack? Sounds like a b-horror film. :)
1 reply →
Do you actually believe this?
Not at all.
Don't be rude, your NSA ROM gets lonely sometimes.
I feel that you're being downvoted by people who don't know history.
I'll add some references:
https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa...
https://en.wikipedia.org/wiki/2010s_global_surveillance_disc...
2 replies →
CPC?
Possibly ParaDOS?
1 reply →
Communist party of china aka ccp