Close Menu
Crypto Chain Post
    Trending

    Trader Outlines Catalysts That Could Trigger 350% Bitcoin Rally, Updates Outlook on Ethereum and Avalanche

    July 11, 2025

    Ethereum advances toward censorship-resistant scaling with zkEVM layer-1 shift

    July 11, 2025

    Bitcoin Price Reaches Pivotal Moment—Is $120K Next?

    July 11, 2025

    Tether to Wind Down USD₮ Support for Five Legacy Blockchains as Part of Strategic Infrastructure Review

    July 11, 2025

    Expert Says Going All-In on XRP Should Be a Priority

    July 11, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Friday, July 11
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » Apple Users Beware: Reported Flaw Exposes Mac Users Crypto Private Keys
    News

    Apple Users Beware: Reported Flaw Exposes Mac Users Crypto Private Keys

    News RoomBy News RoomMarch 23, 2024No Comments2 Mins Read

    A recent study has raised alarms after identifying a vulnerability in Apple’s M-series chips that has the potential to enable hackers to retrieve the cryptographic private keys of Mac users.

    In the absence of a direct resolution, the other method suggested by researchers may drastically hamper performance.

    Apple M-Series Chips Susceptible to Key Extraction

    The vulnerability in question functions as a side channel, thereby permitting the extraction of end-to-end keys when Apple chips execute implementations of commonly employed cryptographic protocols. Due to its origin in the microarchitectural structure of the silicon, direct patching is not feasible, unlike traditional vulnerabilities.

    Instead, the report highlighted a fix that relies on integrating defenses into third-party cryptographic software. However, this approach may significantly, “degrade” the performance of M-series chips during cryptographic tasks, especially evident in earlier generations like M1 and M2.

    The researchers also added that the exploitation of the vulnerability occurs when both the targeted cryptographic operation and a malicious application, operating with standard user system privileges, are processed on the same CPU cluster.

    “Our key insight is that while the DMP only dereferences pointers, an attacker can craft program inputs so that when those inputs mix with cryptographic secrets, the resulting intermediate state can be engineered to look like a pointer if and only if the secret satisfies an attacker-chosen predicate.”

    The latest research sheds light on, what is being toouted as, an overlooked phenomenon regarding DMPs within Apple silicon. In certain cases, these DMPs misinterpret memory content, including critical key material, as the pointer value utilized for loading other data. As a result, the DMP frequently accesses and interprets this data as an address, leading to memory access attempts, the team of researchers explained.

    This process, known as “dereferencing” of “pointers,” entails reading data and inadvertently leaking it through a side channel, representing a clear breach of the constant-time paradigm.

    GoFetch

    The researchers identified this hack as a “GoFetch” exploit while explaining that it operates on the same user privileges as most third-party applications, exploiting vulnerabilities in clusters of M-series chips. It affects classical and quantum-resistant encryption algorithms alike, with extraction times varying from minutes to hours depending on the key size.

    Despite previous knowledge of similar threats, the researchers said that GoFetch demonstrates a more aggressive behavior in Apple’s chips, posing a significant security risk.

    Read the full article here

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related News

    Trader Outlines Catalysts That Could Trigger 350% Bitcoin Rally, Updates Outlook on Ethereum and Avalanche

    July 11, 2025

    Ethereum advances toward censorship-resistant scaling with zkEVM layer-1 shift

    July 11, 2025

    Bitcoin Price Reaches Pivotal Moment—Is $120K Next?

    July 11, 2025

    Expert Says Going All-In on XRP Should Be a Priority

    July 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    Ethereum advances toward censorship-resistant scaling with zkEVM layer-1 shift

    July 11, 2025

    Bitcoin Price Reaches Pivotal Moment—Is $120K Next?

    July 11, 2025

    Tether to Wind Down USD₮ Support for Five Legacy Blockchains as Part of Strategic Infrastructure Review

    July 11, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.