Apple updates Platform Security Guide with new changes coming with the M1 chip
Apple has updated its Platform Security Guide to spotlight the key changes implemented across iPhones, iPads, and therefore the Mac. The nearly 200-page comprehensive technical guide, which you simply can inspect here, details all the features Apple uses to guard users, their devices, and their data.
One of the most important upgrades during this domain is that the Apple M1 chip, which was introduced last year, and every one the safety features that are available through that.
This updated Platform Security Guide has been revised over 10 months and covers iOS 14.3, iPadOS 14.3, the macOS Big Sur 11.1, tvOs 14.3, and watchOS 7.2. There are 11 new topics added to the Platform Security Guide that cover key security changes that are available to Mac users through the Apple M1 chip, the company’s own silicon.
This intensive guide includes information about security elements that are in situ to hide a secure boot process for the new Mac machines and also the authorization requirements needed for enabling kernel extensions on all Apple Macs supported by the M1 chips.
In addition to the present, the updated Platform Security Guide talks about the safety upgrades available on the iPhone and therefore the iPad through iOS 14 and iPadOS 14 updates. These updates include the iBoot implementation that's limited to those iPhones that are supported by the Apple A13 Bionic and later and on iPads running on the A14 Bionic.
The Platform Security Guide also talks about the software and hardware updates caused within the devices within the past to reinforce security on them including Touch ID and Face ID. Both these features were introduced to form user experience better through biometric identification, over and above the passcode protection.
Now, Apple acknowledged that when devices just had passcode protection, only about 49% of users were actually fixing a passcode. So, 51% felt they didn't need a passcode or that punching during a six-digit code whenever to unlock the device was cumbersome. this is often what caused the necessity to introduce biometric identification alongside passcode protection. Post the introduction of those new security measures, over 92% of users chose to choose Touch ID, consistent with company data.
Apple is additionally getting to usher in the power to unlock the iPhone through the Apple Watch soon. So how does the corporate shall secure this given there's no physical connection between the 2 devices?
Apple explained that the Apple Watch features a secure enclave also, like all of Apple’s other products, so when the watch unlocks an iPhone, the 2 secure enclaves on the 2 devices communicate with one another directly. So this suggests that the reliance isn't on the other parts of either one among the devices to unlock the phone. Once the secure enclave on the watch establishes a secure pairing with a secure enclave on the iPhone, only that specific Apple Watch is going to be ready to issue an unlock command, protected by strong cryptography, thereto paired iPhone.
This essentially makes this “connection” safer than ever. Can it be intercepted? Sure, says Apple, one can try but they're going to need to break through the heavily encrypted “gibberish” to undertake and reverse-engineer it and hijack it.
But like all secure systems anywhere, what Apple has in situ isn't foolproof. the corporate has bug bounty programs in situ with sizeable rewards to make sure issues are often stemmed before it gets worse.