How to generate a Symmetric Key on the Secure Enclave of iOS devices and use it to encrypt data

I’m working on a secure app that uses the user’s master password to derive a symmetric key to encrypt all the user information. I want to add FaceId support now, and the approach I was thinking of was to generate a symmetric key on the Sec… Continue reading How to generate a Symmetric Key on the Secure Enclave of iOS devices and use it to encrypt data

Venn Software Snags $29M to build MDM for Laptops Technology

New York startup scores early stage financing to build new technology to replace virtual desktop infrastructure.
The post Venn Software Snags $29M to build MDM for Laptops Technology appeared first on SecurityWeek.
Continue reading Venn Software Snags $29M to build MDM for Laptops Technology

Google will now accept your iPhone as an authentication key

Google has updated its Smart Lock to let iOS users security-dongle-ize their iPhones. Continue reading Google will now accept your iPhone as an authentication key

RISC-V Will Stop Hackers Dead From Getting Into Your Computer

The greatest hardware hacks of all time were simply the result of finding software keys in memory. The AACS encryption debacle — the 09 F9 key that allowed us to decrypt HD DVDs — was the result of encryption keys just sitting in main memory, where it could be read by any other program. DeCSS, the hack that gave us all access to DVDs was again the result of encryption keys sitting out in the open.

Because encryption doesn’t work if your keys are just sitting out in the open, system designers have come up with ingenious solutions to prevent …read more

Continue reading RISC-V Will Stop Hackers Dead From Getting Into Your Computer

Apple’s new security chip kills access to microphone

The security community isn’t usually one to fawn over Apple’s product rollouts, but the computer giant gave it reason to issue some praise on Tuesday. Apple released more details about its T2 security chip, which handles a number of security processes. The chip houses a device’s Secure Enclave, which protects encryption keys, fingerprint data and secure boot. In a security pamphlet released after Apple’s press event on Tuesday, the company revealed that the chip will completely cut off access to the device’s microphone when the MacBook lid is shut. “This disconnect is implemented in hardware alone, and therefore prevents any software, even with root or kernel privileges in macOS, and even the software on the T2 chip, from engaging the microphone when the lid is closed,” the pamphlet reads. The power cut is only limited to the microphone, and not the camera, since the latter would be useless when a […]

The post Apple’s new security chip kills access to microphone appeared first on Cyberscoop.

Continue reading Apple’s new security chip kills access to microphone

Decryption key for Apple iOS Secure Enclave Processor firmware revealed

A hacker that goes by the handle “xerub” has apparently figured out the decryption key for Apple’s Secure Enclave Processor (SEP) firmware, and made it available online: key is fully grown https://t.co/MwN4kb9SQI use https://t.co/I9fLo5Iglh to decrypt and https://t.co/og6tiJHbCu to process — ~ (@xerub) August 16, 2017 What is the Secure Enclave? To quote Apple: The Secure Enclave is a coprocessor fabricated in the Apple S2, Apple A7, and later A-series processors. It uses encrypted memory … More Continue reading Decryption key for Apple iOS Secure Enclave Processor firmware revealed

Here’s How the FBI Might Unlock the San Bernardino iPhone Without Apple’s Help

After weeks of encryption battles, the government thinks it might not need Apple’s help after all. Continue reading Here’s How the FBI Might Unlock the San Bernardino iPhone Without Apple’s Help