Member-only story

Apple T2 Chip Vulnerability Challenges the Industry

Matthew.Rosenquist
2 min readOct 18, 2020

--

Recent verified reports highlight exploitable vulnerabilities in Apple’s security chip that cannot be patched! The announcement adds to the growing concerns and shifting perceptions about hardware security.

Hardware-based security has pros and cons. Many ask if the risk is worth the reward when hardware might be vulnerable. As consumers, we must act responsibly when we choose products and services to encourage the industry to build better-hardened products.

Hardware, when designed properly, can greatly enhance overall platform security. But when the hardware is weak, it can undermine all the other security solutions. Overall, it is complex, time-consuming, and technically difficult to embed security properly.

If mistakes are made, the resulting vulnerabilities in hardware are very difficult to fix. Silicon companies will often work to develop a patch that can reside in the firmware or operating systems. These workarounds can cause severe system performance and may not fully close all the risks.

Apple is working to develop a patch. Given its long-standing commitment to security, it is looking at ways to improve the design process and likely inspecting other hardware components to…

--

--

Matthew.Rosenquist
Matthew.Rosenquist

Written by Matthew.Rosenquist

CISO and cybersecurity Strategist specializing in the evolution of threats, opportunities, and risks in pursuit of optimal security

No responses yet