Home > News content

Apple shares how M1 MAC chip introduces many security technologies on iPhone

via:cnBeta.COM     time:2021/2/19 13:09:34     readed:144

Over the years, Apple has been trying to build advanced privacy features on IOS. For example, more than a decade ago, the company introduced the method of encrypting information on the iPhone. In 2013, the company launched the touch ID biometric sensor, which allows users to easily unlock their phones with their fingerprints.However, it was not until the advent of the M1 self-developed chip that the company introduced built-in security features comparable to the iPhone / iPad for the MAC product line.

It is reported that the document deeply discusses the mutual communication of various security mechanisms in computers and smart computers, as well as the design adopted to protect users' privacy.

'only with built-in hardware can we lay a solid foundation for security software,' the company wrote in a 200 page document.

For a tech giant like apple, sharing technical details seems to go against the old style of secrecy. But from the perspective of marketing, the company has always been famous for paying attention to the safety and privacy of customers.

Apple said it began providing such information to commercial customers more than a decade ago. It was soon discovered that this would help security research partners find security vulnerabilities in their own devices.

However, as a part of Apple's security system, ordinary consumers do not need to understand the details of professional terms such as "kernel integrity protection" and "pointer authentication code".

Apple said that part of the original intention of designing the security system is to protect the security of users in the background. Taking the built-in encryption function of IMessage messaging service as an example, users do not need to know how to turn it on.

In addition, Apple has built a security mechanism based on touch ID fingerprint sensor and face ID face recognition to encourage users to use the official encryption mechanism (which will be activated after the password is set on the device).

At the same time, many other technology industries have implemented "vulnerability bounty" programs in the past decade (Apple has also paid $1.5 million) to encourage external researchers to submit security vulnerabilities.

Related articles:

Apple update Platform Security Guide: Apple silicon Mac will not support kernel extensions

China IT News APP

Download China IT News APP

Please rate this news

The average score will be displayed after you score.

Post comment

Do not see clearly? Click for a new code.

User comments