{"id":33091,"date":"2017-08-22T16:44:10","date_gmt":"2017-08-22T20:44:10","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/iphone-secure-enclave-firmware-encryption-key-leaked-techtarget.php"},"modified":"2017-08-22T16:44:10","modified_gmt":"2017-08-22T20:44:10","slug":"iphone-secure-enclave-firmware-encryption-key-leaked-techtarget","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/iphone-secure-enclave-firmware-encryption-key-leaked-techtarget.php","title":{"rendered":"iPhone Secure Enclave firmware encryption key leaked &#8211; TechTarget"},"content":{"rendered":"<p><p>    Despite early reports, experts agree that the leak of the    iPhone Secure Enclave Processor firmware encryption key should    not pose a security risk and may even ultimately improve user    security.  <\/p>\n<p>    When a hacker\/researcher going by the handle \"xerub\" released    the firmware encryption key, the initial reaction was one of    panic because the iPhone Secure Enclave is responsible for    storing and processing highly sensitive data, as described by    Mike Ash, software engineer and fellow at Plausible Labs, in    response to the debate around the FBI wanting     backdoor access to Apple's encryption:  <\/p>\n<p>    \"The Secure Enclave contains its own [unique ID] and hardware        AES engine. The passcode verification process takes place    here, separated from the rest of the system. The Secure Enclave    also handles     Touch ID fingerprint processing and matching, and    authorizing payments for Apple Pay,\" Ash wrote in a blog post about iPhone Secure Enclave last    year. \"The Secure Enclave performs all key management for    encrypted files. File encryption applies to nearly all user    data.\"  <\/p>\n<p>    While most iPhone system apps use Secure Enclave, and all    third-party apps use it by default since iOS 7, Ash wrote, \"The    main CPU can't read encrypted files on its own. It must request    the file's keys from the Secure Enclave, which in turn is    unable to provide them without the user's passcode.\"  <\/p>\n<p>    While this sounds bad, David Schuetz, senior security    consultant at NCC Group, said in his own analysis that the    encryption key xerub released was specific to the GSM model of    the iPhone 5S -- the     first Apple device with the Secure Enclave Processor --    running iOS 10.3.3.  <\/p>\n<p>    Apple reportedly told TechRepublic that    decrypting the iPhone Secure Enclave firmware \"in no way    provides access\" to user data and that Apple does not have    plans to patch affected devices.  <\/p>\n<p>    Xerub also told TechRepublic the encryption key would    not impact user security but said the \"public scrutiny\" around    the release could improve the security of    the iPhone Secure Enclave.  <\/p>\n<p>    Schuetz added that modifying the iPhone Secure    Enclave firmware would not be possible because \"the firmware is    also signed by Apple, and the attacker would need to be able to    forge the     signature to get the phone to install the hacked firmware.\"  <\/p>\n<p>    \"I think this is a good thing, in the long run. This should    have very little practical effect on the security of individual    iOS devices, unless a very significant flaw is uncovered. Even    then, the potential scope of the finding may be limited to only    older devices,\" Schuetz wrote. \"If the security of the Secure    Enclave is in any way directly reduced by the disclosure of the    firmware, then it wasn't truly secure in the first place.\"  <\/p>\n<p>    Learn whether or not Apple's Touch ID is     ready for enterprise adoption.  <\/p>\n<p>    Find out why IT pros are confident in Apple's     Apple's data protection and encryption.  <\/p>\n<p>    Get info on     undetectable encryption backdoors in crypto keys demoed by    researchers.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/searchsecurity.techtarget.com\/news\/450424884\/iPhone-Secure-Enclave-firmware-encryption-key-leaked\" title=\"iPhone Secure Enclave firmware encryption key leaked - TechTarget\">iPhone Secure Enclave firmware encryption key leaked - TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Despite early reports, experts agree that the leak of the iPhone Secure Enclave Processor firmware encryption key should not pose a security risk and may even ultimately improve user security. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-33091","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33091"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33091"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33091\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}