Quote:
Originally Posted by apollo828
No. Just...no. It's not that simple, period. Is it 100% impossible? Maybe not, but even if it is doable, it's for reasons that are far more complicated than looking for "signatures" in files and other standard anti-virus techniques. Why? Security is basically a chain of trust. I have to be able to trust that something at a lower level isn't lying to me. The T2 breach basically means there's no reason why we can trust the chip when it tells us everything's okay.
If Apple doesn't currently have a method for detecting a breach, chances are very low that they ever will. You don't know what you're talking about, period. You sound like someone who believes a CD player from 1984 should be able to work as a UHD player simply because the discs are the same size.
|
The exploit tool would be installed on the hard drive, so looking for that file would work. The Chip itself doesn’t need to be checked. The company would learn about the tool and the name of it and make the player software look for it.