跳转到主内容
帮助

当前版本: Tom Chai ,

文本:

Literally zero possibility as of now, no real progress made for so many years.
 
The idea of pairing it up for security is that the fingerprint data from the Touch ID to the CPU travels over a visible SPI bus that can be tapped by hardware, or even read/write by software if hackers are able to inject the right address via DMA. Therefor it is necessary to implement end-to-end encryption and per-device/per-session keys. Apple did that by writing the per-device key directly into the hardware and negotiate a per-session key based on the per-device key.
 
There ARE more repair friendly cryptography implementations, however the increased complexity may increase the cost of the sensor chip. Apple might be trying to cheap out or being a jacksss this time.
There ARE more repair friendly cryptography implementations, however the increased complexity may increase the cost of the sensor chip. Apple might be trying to cheap out or being a jacksss this time.

状态:

open

原帖由: Tom Chai ,

文本:

Literally zero possibility as of now, no real progress made for so many years.

The idea of pairing it up for security is that the fingerprint data from the Touch ID to the CPU travels over a visible SPI bus that can be tapped by hardware, or even read/write by software if hackers are able to inject the right address via DMA. Therefor it is necessary to implement end-to-end encryption and per-device/per-session keys. Apple did that by writing the per-device key directly into the hardware and negotiate a per-session key based on the per-device key.

There ARE more repair friendly cryptography implementations, Apple might be trying to cheap out or being a jacksss this time.

状态:

open