Apple M1, M2 and M3 processors have irreversible security vulnerabilities

You may want to know that the Apple M1, M2, and M3 processors used in the latest Mac and iPad devices have a security vulnerability that could potentially put user data at risk. The issue, named GoFetch, was exposed by TechNewsSpace. It allows attackers to access encrypted confidential data, thereby compromising user privacy.

The vulnerability is related to the DMP (Data Memory-dependent Prefetcher) data preload mechanism embedded in the Apple Silicon chip. The DMP mechanism helps speed up processing by loading data into memory before it is needed. However, it sometimes loads unwanted data into the CPU cache, bypassing software security measures. Hackers can exploit this flaw to fool encryption software and cache sensitive data, which can be stolen.

Even the most secure encryption algorithms, including those that use 2048-bit keys, are vulnerable to this security vulnerability. However, it is worth noting that processors that use the Intel Raptor Lake architecture (13th and 14th generation) are not affected by this vulnerability despite also using the DMP mechanism.

Apple is expected to fix this weakness by designing the M4 chip to eliminate the issue. However, reducing encryption and decryption performance on affected devices is the only way to minimize the risk. Additionally, Apple may provide software updates to mitigate the impact of the vulnerability.

The GoFetch vulnerability highlights the importance of data security. You must use additional security measures, such as strong passwords and anti-virus software, to safeguard your data.

Related posts

Google launches Gemini 2.0 – comprehensive AI that can replace humans

NVIDIA RTX 5090 can be 70% more powerful than RTX 4090?

iOS 18.2 launched with a series of groundbreaking AI features