Several reports show that a hacker using the nickname "xerub" managed to decrypt Apple's Secure Enclave Processor firmware (SEP) and published the decryption key on Thursday.
Secure Enclave Processor (SEP) is a feature on the A7 chipset that powers the iPhone 5, iPad Air, iPad mini 2, and iPad mini 3 as well as any Apple A series processor.
It is capable of managing its functions touch ID, the cryptographic functions of Apple Watch smartwatches TV Shows 2, code verifications accessand other security-related processes.
SEP is encrypted by the design and is completely isolated, which means it can not be tampered with.
“The processor forwards the data to Secure Enclave but cannot read it. They are encrypted and validated with a session key negotiated using the device's shared key provided for the Touch ID sensor and Secure Enclave, ”says Apple.
The decryption key will not allow hackers to access stored data.
The hacker announced on account tweeted that he managed to decrypt Apple's Secure Enclave Processor (SEP) firmware using the img4lib library, which can deal with img4 files, along with a SEP firmware splitting tool designed to handle the decrypted files.
Both tools were developed by the hacker and are available on GitHub for security researchers who want to try to decrypt Apple's SEP firmware to find vulnerabilities. However, these tools will not allow them to access the data stored in the SEP.
Below you can see the security architecture diagram of Apple's iOS mobile operating system to understand how its security system works. The hacker said the decryption key is "fully deployed" and that you can download the required tools from the links below.
key is fully grown https://t.co/MwN4kb9SQI use https://t.co/I9fLo5Iglh to decrypt and https://t.co/og6tiJHbCu to process
- ~ (@xerub) August 16