We all know that the tech giant Apple has, in recent years, invested heavily in the iPhone to ensure the safety of users and their data. One of the strongest measures implemented in iPhone was the use of SEP which was recently decrypted by a hacker.
iPhone HACK: A Hacker Has Decrypted The iPhone’s Security Chip
The tech giant Apple has, in recent years, invested heavily in the iPhone to ensure the safety of users and their data. There are several measures known to encrypt them and make them inaccessible, something that has worked in favor of the company.
One of the strongest measures implemented was the use of SEP, a dedicated chip for security and few processes can access. The SEP is still a safety measure but has now been broken and its code will be public.
The SEP (Secure Enclave Processor) was introduced with the Apple A7 processor in the creation of the iPhone 5S. Its role is to manage and ensure the protection of all the major iOS security elements, such as Touch ID, encryption, and other really important tasks.
It is so protected that even if iOS is compromised or the iPhone’s own processor is attacked, the data gets isolated and simply become inaccessible. But the publication of a hacker has come to ruin this unique model of protection.
— ~ (@xerub) August 16, 2017
What Xerub published, in a non-direct and accessible to all, is the key used to encrypt SEP’s own firmware, thus opening the door for this code to be read and evaluated by anyone.
Is iPhone security compromised?
It could be understood that iPhone security was compromised and that hackers now have access to any iPhone and its data, but the truth is that this is not so.
Since the published key only gives access to the SEP firmware code, even if the data is accessed they can not be read. However, there is the possibility that in the future, and with access to this code, the hacker will create ways to read user data without any blocking.
The tech giant Apple will certainly react to this security breach and change the SEP cipher key, but the truth is that this will be of little use once the code becomes available. This breach may, however, work in your favor since it is being public, the code can be evaluated and any flaws reported to the tech giant Apple.
So, what do you think about this new iPhone hack and security exploit? Simply share your views and thoughts in the comment section below.