←back to thread

295 points djoldman | 1 comments | | HN request time: 0.208s | source
Show context
jagrsw ◴[] No.42062732[source]
If Apple controls the root of trust, like the private keys in the CPU or security processor used to check the enclave (similar to how Intel and AMD do it with SEV-SNP and TDX), then technically, it's a "trust us" situation, since they likely use their own ARM silicon for that?

Harder to attack, sure, but no outside validation. Apple's not saying "we can't access your data," just "we're making it way harder for bad guys (and rogue employees) to get at it."

replies(5): >>42062974 #>>42063040 #>>42063051 #>>42064261 #>>42065655 #
ozgune ◴[] No.42062974[source]
+1 on your comment.

I think having a description of Apple's threat model would help.

I was thinking that open source would help with their verifiable privacy promise. Then again, as you've said, if Apple controls the root of trust, they control everything.

replies(2): >>42063861 #>>42063907 #
1. bootsmann ◴[] No.42063861[source]
They define their threat model in "Anticipating Attacks"