, 8 tweets, 2 min read Read on Twitter
1/n: My rant about the new Checkm8 BootROM exploit and what it means for security of iOS devices.
2/n: it is super cool technically and I’m looking forward to playing with it on my older iOS devices.
3/n: There is a world of difference in the security of iOS-based devices between the last public BootROM exploit (limera1n) and now due to the introduction of the Secure Enclave. With limera1n, you could boot a ramdisk and brute force a 4-digit PIM in roughly 18 minutes.
4/n: On devices with the Secure Enclave, the kernel has to ask it to unlock the device. The kernel also has to give it its signed firmware at boot (and cannot rollback to previous versions). Even when using a BootROM exploit to modify kernel, you can’t mess with Secure Enclave.
5/n: The Secure Enclave enforces rate limits and erase-device-after-n-failures (I think?), so there isn’t much advantage to trying to brute force after booting a modified kernel. They can, however, modify the kernel in memory, give you back your device, and hope you don’t reboot.
6/n: For persistence, they have to find a way to modify the filesystem to run an exploit at boot to get code execution, and then exploit the kernel to re-jailbreak. This is what is needed for what are called “tethered” jailbreaks. Checkm8 doesn’t do that (yet). It’s still hard.
7/n: This is one link in an attack chain and one that requires physical access to exploit. The attacker still needs the other links to do Bad Things (TM). I don’t think sky is falling. Browser full-chains and iMessage remotes are still way scarier to me.
8/n: Finally, why is the sky not falling from this compared to the discovery and release of limera1n?

Because of some bad-ass security engineering on developing and shipping the Secure Enclave, that’s why.

Fin.
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Dino A. Dai Zovi
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!