Iwasawa 🌟 (one hikari of too many)
(replying to Saagar Jha)
@saagar could you tell me more about what the hell that is
2 replies →
2 replies
Saagar Jha
(replying to Iwasawa 🌟 (one hikari of too many))
@hikari Image if you could be the root of trust on your machine
Skip R. :ms_two_male_symbols:
(replying to Iwasawa 🌟 (one hikari of too many))
@hikari @saagar at risk of dunning-krugering too hard i think what Saagar is trying to get at is that because SIP is the first line of defense in a lot of ways your two choices are "be able to snoop on platform binaries/poke around, but your security posture is utterly fucked" and "literally can't do anything interesting"
Saagar Jha
(replying to Skip R. :ms_two_male_symbols:)
@slice @hikari This is actually the security model of all computers Apple just identifies it as something specific
Skip R. :ms_two_male_symbols:
(replying to Saagar Jha)
@saagar @hikari it actually drives me insane that Apple actually has the opportunity to innovate here (and has, e.g. wrt BootPolicy) but they just don't
Saagar Jha
(replying to Skip R. :ms_two_male_symbols:)
2 replies →
2 replies
Skip R. :ms_two_male_symbols:
(replying to Saagar Jha)
@saagar @hikari shout out to my friend who literally just gave up getting AMFITrustedKeys on a retail unit and just got hired instead