VOGONS

Common searches


Search results

Display options

Re: EU votes for Right to Repair

Apple devices have built in security and are part of the Applepay eco-system. They dont want un-authorized people messing with there hardware. Also Apple is a brand name that wants quality control over there products. Of course, you don't actually believe what you wrote, but just for the sake of …

Re: EU votes for Right to Repair

I think it's a good first step, but it's nowhere near enough. From the linked article, it looks like this only assigns repairability scores. Unless these scores significantly impact consumer buying decisions, and unless better options exist, I can't see this having too much of an impact. As it …

Re: Apple's T2: Vulnerable and Unfixable

The T2 is known to do some really strange things - Ever since I witness a T2 on a Mac crap the bed and lose the ability to decrypt the APFS volume right before a major trade conference I had been less than complementary towards it. When you are asked to put all eggs in a single basket, you better …

Re: Apple's T2: Vulnerable and Unfixable

For those who missed it, there is a follow-up article with videos. If you thought: Error 0x7CF wrote on 2020-11-25, 07:12: * Requires physical access in any way mitigates the significance of this, go read/watch, then think again.

Re: Apple's T2: Vulnerable and Unfixable

https://www.microsoft.com/security/blog/2020/11/17/meet-the-microsoft-pluton-processor-the-security-chip-designed-for-the-future-of-windows-pcs/ Thanks; I hadn't read about that yet. I'm not sure how much I like the idea, though. Hopefully MS and partners do a better job of it than Apple did. …

Re: Apple's T2: Vulnerable and Unfixable

* Requires physical access I see this claim used as a defence every time this is discussed. The simple fact that it requires a person to be in the same room as the machine doesn't reduce the possibility of attack. Yes, it means that I can't compromise your machine from my desk in another country, …

Re: Apple's T2: Vulnerable and Unfixable

The researchers did try to contact Apple multiple times, and got no response, according to what was posted. When multiple attempts allegedly failed to generate even the slightest response, the entire exploit and proof-of-concept details were published. Normally, if a major, previously-unknown flaw …

Page 14 of 45