First post, by 640K!enough
I haven't seen any discussion of this matter here, and thought it might be worth mentioning. I'm always interested in the different viewpoints, and am hoping for a constructive discussion.
The story in question is from October. Apparently, Apple's T2 "security" co-processor is vulnerable to attack. Furthermore, because of the point in the startup process that the attack begins and the design of the T2, it is unfixable, and it doesn't seem there is any possible work-around. The most detailed coverage I have found so far is here.
As a result of this, there are three possible approaches Apple could take to fix this problem:
- Create a re-call programme and have a technician de-solder the T2 and replace it with a fixed version.
- Same as above, but replace the entire board in affected machines.
- Give users of affected machines who have AppleCare or still-valid warranty a fixed replacement machine.
Of course, with Apple being Apple, the response will more likely be this: acknowledge nothing, say nothing, fix nothing, wait for the class-action lawsuit, then settle for a pittance. Then, future machines will suddenly not suffer from this, but there was nothing wrong with it to begin with. In typical Apple style, the attitude will be that those who want a fixed machine can simply buy a new one. This would be the same approach they took with the iPhone 4 antenna disgrace, and other problems. The only difference then was that they brought Jobs out to make a fool of himself, trying to pretend that all phones suffered from the same flaw. I doubt we'll be hearing from Mr. Cook or anyone else officially.