Vice: The Prototype iPhones That Hackers Use to Research Apple’s Most Sensitive Code

[…]The thing that his team had been able to analyze for the first time was the iPhone’s Secure Enclave Processor (SEP), which handles data encryption for the iPhone. How they were able to do this was a valid question given Apple’s notorious secrecy, and the fact that the SEP is one of the most important and most closely guarded components of the iPhone, the most secure smartphone on the market. […]

https://motherboard.vice.com/en_us/article/gyakgw/the-prototype-dev-fused-iphones-that-hackers-use-to-research-apple-zero-days

Apple SEP story from August, again

[AFAICT nothing new recently, this is just the August story being rehashed again in November, I think…]

Re: https://firmwaresecurity.com/2017/08/17/apple-secure-enclave-processor-sep-firmware-hacked/

https://www.theiphonewiki.com/wiki/Greensburg_14G60_%28iPhone6,1%29

https://github.com/xerub/img4lib

Arg, WordPress inserts the entire contents of Github Gists into posts. To view sepsplit.c, remove the 2 spaces from below URL, or click on 2nd t.co-based URL in above @xerub tweet.

https://gist. github.com /xerub/0161aacd7258d31c6a27584f90fa2e8c

Click to access us-16-Mandt-Demystifying-The-Secure-Enclave-Processor.pdf

Hackaday:

Apple’s Secure Enclave Processor (SEP) Firmware Decrypted