The chip M1, which is inside the new iPad Pro and the new MacBook Air, MacBook Pro, Mac mini and iMac, has a security problem, according to developer Hector Martin.
Vulnerability exists at the hardware level and cannot be corrected. Apple has violated some specifications of the Arm architecture, which means there is no easy way to mitigate it. The problem is that two applications can exchange data without following the usual operating procedures.
Fortunately, the vulnerability does not pose a serious security risk and, in the worst case, it could be used by advertisers for cross-app tracking. Martin says that cannot be used to gain control of the device or steal personal data.
However, the defect is a defect and this bypasses the security models of the operating system. Affects all devices with M1 and hypothesis and mobile phones of the iPhone 12 series, why the A14 Bionic is based on the same microarchitecture as the M1.
The only solution is to run the whole operating system as a virtual machine (VM), but it would be a great waste of resources.
The problem is expected to affect the next generation M1, but maybe we’ll see some fix by then. Hopefully the Μ1Χ chips which will be located in the next MacBook Pro will not have the same problem.
Apple is aware of the issue and has acknowledged its existence.
Source: myphone.gr by feeds.myphone.gr.
*The article has been translated based on the content of myphone.gr by feeds.myphone.gr. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!
*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.
*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!