Tim Mahoney
(replying to Saagar Jha)
So even if the software guarantees/attestation/etc remain secure, some sort of hardware change could compromise the system?
I find it hard to believe that a vulnerability like that would be overlooked. I guess I assume the flow would also include hardware attestation.
Or is it something else I’m missing?
Saagar Jha
(replying to Tim Mahoney)
@_tim______ Overlooked by whom? I don’t see the server. Apple can do whatever they want to it. Like, for example, it could have a little attachment on it that waits to pull decrypted data out of RAM (don’t take this example too seriously)
Saagar Jha
(replying to Saagar Jha)
@_tim______ Who is checking for that? How often? There is a note about a third party audit but we don’t know anything about that yet. And I’m still not sure how much trust that would confer
Tim Mahoney
(replying to Saagar Jha)
@saagar That’s a good question. You’d hope that this whole system was provably secure even if someone has access to all the hardware, software, everything. I guess we’ll see as more information comes out.
Saagar Jha
(replying to Tim Mahoney)
@_tim______ See I don’t think we actually know how to do this yet at a theoretical level