Hackers Found An Unpatchable Weakness In A Security Feature That Has Protected Apple Users For Years
Dhir Acharya - Aug 05, 2020
Even iPhone users may haven’t of this term, but Apple has a padlock that protects almost all of its products called the Secure Enclave.
- Apple Kills Original HomePod, Focusing On HomePod Mini
- iPhone 12 Color Is Fading Away Quickly And No One Knows Why
- Apple Sues Ex-Employee For Stealing Company’s Secrets To The Media
Even iPhone users may haven’t of this term, but Apple has a padlock that protects almost all of its products called the Secure Enclave. The tech giant described the feature as a secure coprocessor consisting of a hardware-based key manager that’s isolated from the main processor, providing an additional security layer.

This feature is used on many models of the iPad, iPhone, Apple Watch, Mac, Apple TV, and HomePod product lines. All the data on such devices is encrypted with random private keys that can only be accessed through the Secure Enclave. Then, the coprocessor stores the keys that manage sensitive data like passwords. The company writes:
“The Secure Enclave also maintains the integrity of its cryptographic operations even if the device kernel has been compromised. Communication between the Secure Enclave and the application processor is tightly controlled by isolating it to an interrupt-driven mailbox and shared memory data buffers.”
Simply speaking, here’s how the Secure Enclave works, when storing a private key in the hardware, you don’t directly deal with the key. In fact, the Secure Enclave is assigned to generate the key, store it securely, and perform operations with it. Eventually, you receive the output of this process only, making it extremely difficult for the key to be compromised.

However, hackers have made a lot of attempts to compromise the key for a long time. In 2017, a group of hackers was able to decrypt the Secure Enclave firmware but they couldn’t access the private keys, so users remain safe.
Unfortunately, a group of Chinese hackers named Pangu Team has found the hardware’s weakness that could allow them to decrypt the private security keys, according to 9to5Mac. With this unpatchable exploit, Apple users now have a reason to worry about their privacy and security.
The exploit in the hardware instead of the software, so Apple cannot fix it remotely with a patch as it does with bugs. So far, there haven’t been any details revealed regarding what the hackers may do with this exploit but they would likely need physical access to a device to make it happen.
So, for now, at least Apple users can hope that as long as they keep their devices secure. Never leaving their eyesight, they will be safe.
>>> Hackers Reportedly Earn 120,000$ From Hacking Major Twitter Accounts
Featured Stories

Features - May 09, 2025
Huawei Officially Launches PC-Exclusive Operating System, Completely Replacing...

ICT News - Apr 09, 2025
Experts Say Trump's Call for US-Made iPhones Could Triple Prices

ICT News - Apr 08, 2025
How Would US Tariff Affect Tech Prices in India?

ICT News - Feb 26, 2025
Elon Musk's Federal Workforce Overhaul: AI Takes the Helm

ICT News - Feb 26, 2025
Will AI Kill Coding Jobs? The Truth Might Surprise You

ICT News - Feb 25, 2025
Not Radiation: What Is Causing the Strange Genetic Evolution of Chernobyl’s Dogs?

ICT News - Feb 25, 2025
Google to Phase Out SMS-Based Authentication Codes

ICT News - May 17, 2022
3 Reasons your privacy gets compromised online

ICT News - May 11, 2022
Apple Devices For Sale

ICT News - Apr 12, 2022
Pin-Up Review India 2022
Read more

Features- May 09, 2025
Huawei Officially Launches PC-Exclusive Operating System, Completely Replacing Windows
Huawei confirms its upcoming computer models will come pre-installed with HarmonyOS 5 for PC.

Mobile- May 09, 2025
After Windows Replacement OS, Huawei Set to Launch "Kirin X90" Chip for PCs to Replace Intel
This isn't Huawei's first venture into the personal computer market, but it marks the first time the company will own both the operating system and domestic processing chip for a desktop device.
Comments
Sort by Newest | Popular