A new security vulnerability has been discovered in Apple's Mac and Young Kinky Sex (2008) Watch online full movieMacBook computers – and the worst part is that it's unpatchable.
Academic researchers discoveredthe vulnerability, first reported by Ars Technica, which allows hackers to gain access to secret encryption keys on Apple computers with Apple's new Silicon M-Series chipset. This includes the M1, M2, and M3 Apple MacBook and Mac computer models.
SEE ALSO: Bing vulnerability made it possible to alter search resultsBasically, this vulnerability can be found in any new Apple computer released from late 2020 to today.
The issue lies with prefetchers— components meant to predictively retrieve data before a request to increase processing speed — and the opening they leave for malicious attacks from bad actors.
The researchers have dubbed the attack "GoFetch," which they describe as "a microarchitectural side-channel attack that can extract secret keys from constant-time cryptographic implementations via data memory-dependent prefetchers (DMPs)."
A side-channel attack is a type of cyber attack that uses extra information that's left vulnerable due to the design of a computer protocol or algorithm.
The researchers explained the issue in an email to Ars Technica:
Prefetchers usually look at addresses of accessed data (ignoring values of accessed data) and try to guess future addresses that might be useful. The DMP is different in this sense as in addition to addresses it also uses the data values in order to make predictions (predict addresses to go to and prefetch). In particular, if a data value "looks like" a pointer, it will be treated as an "address" (where in fact it's actually not!) and the data from this "address" will be brought to the cache. The arrival of this address into the cache is visible, leaking over cache side channels.
Our attack exploits this fact. We cannot leak encryption keys directly, but what we can do is manipulate intermediate data inside the encryption algorithm to look like a pointer via a chosen input attack. The DMP then sees that the data value "looks like" an address, and brings the data from this "address" into the cache, which leaks the "address." We don’t care about the data value being prefetched, but the fact that the intermediate data looked like an address is visible via a cache channel and is sufficient to reveal the secret key over time.
Basically, the researchers discovered that the DMPs in Apple's Silicon chipsets – M1, M2 and, M3 – can give hackers access to sensitive information, like secret encryption keys. The DMPs can be weaponized to get around security found in cryptography apps, and they can do so quickly too. For example, the researchers were able to extract an 2048-bit RSA key in under one hour.
Usually, when a security flaw is discovered nowadays, a company can patch the issue with a software fix. However, the researchers say this one is unpatchable because the issue lies with the "microarchitectural" design of the chip. Furthermore, security measures taken to help mitigate the issue would require a serious degradation of the M-series chips' performance.
Researchers saythat they first brought their findings to Apple's attention on December 5, 2023. They waited 107 days before disclosing their research to the public.
Topics Apple Cybersecurity MacBook
Ethical nonChina unveils detailed steps to stimulate private sector · TechNodeStand on the surface of an alien planet with NASABest outdoor deal: The Solo Stove Bonfire 2.0 is just $174.99 at Target.'Fallout' review: Video game adaptation is a wild nuclear WesterniPhone 16: New battery leak is good news for ‘Pro Max,’ but sad news for ‘Plus’Galaxy S24 Ultra camera issues: Samsung is reportedly releasing another updateHow to restart your iPhoneAcer laptops under $300 as a Target Deal of the DayPurdue vs. UConn basketball livestreams: How to watch liveMicrosoft patch Tuesday: Windows 11 update fixes recordMicrosoft patch Tuesday: Windows 11 update fixes recordBest deals at Target: From April 7 to 13, shoppers can save up to 40% during Target Circle WeekTrump's Space Force isn't new: U.S. has militarized space for decadesBest free online courses from MITWhy is Caravaggio so important to Netflix's 'Ripley'?WPS introduces AI assistant powered by OpenAI LLM for overseas clients · TechNodeChinese automaker GWM launches fuelFoxconn to invest $500 million in India for two new components factories · TechNodeTrump's Space Force isn't new: U.S. has militarized space for decades Older people way more OK with police using facial recognition, Pew poll finds 12 new fall TV shows everyone needs to watch 'A Beautiful Day in the Neighborhood' review: Why we need Mr. Rogers TCL's new sound bar uses less speakers to get a better sound 'Fleabag' Hot Priest satisfies thirsty fans with canned gin and tonics Man who lost his testicles while showing off his scuba bong is fake news Former James Bond Pierce Brosnan thinks it's time for a woman to play the role This might be the creepiest cover art of all time Dude skis right off a cliff and captures the whole thing on his helmet cam Dude makes extremely smooth save after face 'Knives Out' is the most fun you'll have at the movies this year David Beckham hilariously trolls his son Brooklyn on Instagram live YouTube's $170 million fine isn't enough—and part of the FTC knows it Antonio Brown's time as a Raider ends with an Instagram hashtag 'Microsoft the Musical' is the catchiest tech musical you'll ever see CNN trolls Trump Review: 'Hustlers' is as a great time with a powerful message 'Joker' wins top Venice Film Festival award given to Oscar winners Gov. Brown declares war on Trump's 'alternate universe of non No, PlayStation. The 'X' button is not actually the 'Cross' button.
1.8982s , 8225.8125 kb
Copyright © 2025 Powered by 【Young Kinky Sex (2008) Watch online full movie】,Evergreen Information Network