Originally posted by L_A_G
View Post
There shouldn't be any pin pulling as the T2 doesn't work with a separate SSD.
I've seen repair videos of Apple boards, their SMC (system management controller) does have the ability to pull all other separate controller reset pins (wifi, SSD, thunderbolt) even in devices where the SSD is soldered on, as it has to do so on system reset or other occasions.
As I said, this is really just Apple implementing the same iPhone tech that has caused so many headaches to law enforcement trying to access devices. If that's anything to go by then this is a clear step up from what's been done before. You can go on about how this is nothing new, but as usual whenever Apple tries something that has already been done their solution is usually more involved and refined.
When the government sued Apple they refused to create the protection nullifying "cancer" update and the case was dropped primarily because the FBI was contacted by the developer of the really involved hardware attack.
But the fact that someone already knew how to hack it called them does not give me a lot of confidence.
Nor shit like the iCloud passwords bruteforced ("The Fappening") because the auth mechanism was completely retarded and could be tricked with fabricated tokens.
With normal business grade hardware the attack would probably have to have been less involved than the one the FBI had to resort to in their effort to gain access to the San Bernadino terrorist's phone.
I'm not saying businness-grade stuff is airtight, mind me, I'm just saying that they at least have a track record and some evolution.
It seems like you completely misunderstood my sarcasm there... Because the point was that the Mac Mini is expensive to the point of simply not being worth it.
T2 isn't making them more expensive, people isn't buying them because they are more secure, they buy because Apple cult.
Except maybe if you're a pedophile, drug dealer, terrorist, spy or some other kind of person the government would want to see what you've got on your HDD.
I'm totally going to trust some random company's self-written PR material with my crucial stuff, and not buy actual certified hardware from vendors that made self-encrypting drives fir for businness and agency use for the last decades, nor use some decent opensource software disk encryption with a password I store in my brain.
Seriously, security needs to be proven and tested, PR statements don't count.
Well your "REEE!!!! STOP LIKING WHAT I DON'T LIKE!!!1"-nonsense isn't exactly making the Linux user community look any better...
We are talking of security here, people can get hurt if they trust the wrong party.
Comment