Several reports show that a hacker using the nickname "xerub" managed to decrypt Apple's Secure Enclave Processor firmware (SEP) and published the decryption key on Thursday.
Secure Enclave Processor (SEP) is a feature on the A7 chipset that powers the iPhone 5, iPad Air, iPad mini 2, and iPad mini 3 as well as any Apple A series processor.
It is capable of managing its functions touch ID, the cryptographic functions of the Apple Watch Series 2 smartwatch, password authentication, and other security-related processes.
SEP is encrypted by the design and is completely isolated, which means it can not be tampered with.
“The processor forwards the data to Secure Enclave but cannot read it. They are encrypted and validated with a session key negotiated using the device's shared key provided for the Touch ID sensor and Secure Enclave, ”says Apple.
The decryption key will not allow hackers to access stored data.
The hacker announced in his Twitter account that he was able to decipher Apple's Secure Enclave Processor (SEP) using the img4lib library, which can deal with img4 files, along with a SEP firmware splitter designed to handle decrypted files.
Both tools were developed by the hacker and are available at GitHub for security researchers wanting to try to decipher Apple's SEP firmware to detect vulnerabilities. However, these tools will not allow them to access the data stored in SEP.
Below you can see the security architecture diagram of Apple's iOS mobile operating system to understand how its security system works. The hacker said the decryption key is "fully deployed" and that you can download the required tools from the links below.
- ~ (@xerub) August 16