	{"id":92395,"date":"2020-10-13T17:13:21","date_gmt":"2020-10-14T00:13:21","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=92395"},"modified":"2020-10-23T01:10:55","modified_gmt":"2020-10-23T08:10:55","slug":"apples-t2-security-chip-makes-macs-unsecure","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/","title":{"rendered":"Apple&#8217;s T2 security chip makes Macs unsecure"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-92398\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-292x300-1.png\" alt=\"Apple Mac T2 security chip with yellow warning sign exclamation emoji.\" width=\"292\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-292x300-1.png 292w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-292x300-1-146x150.png 146w\" sizes=\"(max-width: 292px) 100vw, 292px\" \/><\/p>\n<p>The majority of Mac models released since 2018 to date have contained a T2 security chip.<\/p>\n<p>Apple makes a number of security claims about this chip, <a href=\"https:\/\/support.apple.com\/en-us\/HT208862\" target=\"_blank\" rel=\"noopener noreferrer\">stating<\/a> that &#8220;the T2 chip enables a new level of security by including a secure enclave coprocessor that secures Touch ID data and provides the foundation for new encrypted storage and secure boot capabilities.&#8221;<\/p>\n<p>Little did Apple know that the T2 chip also contains flaws that inadvertently make Macs <em>less secure<\/em> and more susceptible to serious local attacks. Apple cannot fix these flaws via a firmware update, so affected Macs are unpatchable and will remain vulnerable.<\/p>\n<h3>How T2 makes Macs insecure<\/h3>\n<p>Belgian cybersecurity consulting firm ironPeak, which wrote a <a href=\"https:\/\/ironpeak.be\/blog\/crouching-t2-hidden-danger\/\" target=\"_blank\" rel=\"noopener noreferrer\">detailed overview<\/a> of the problem, summarizes several of the ways an attacker could leverage the T2&#8217;s design flaws:<\/p>\n<blockquote><p><strong>TL;DR: recent Macs (2018-2020, T2 chip) are no longer safe to use if left alone and physical access was possible, even if you had them powered down.<\/strong><\/p>\n<p>\u2022 The root of trust on macOS is inherently broken<br \/>\n\u2022 [An attacker] can bruteforce your FileVault2 volume password<br \/>\n\u2022 [An attacker] can alter your macOS installation [i.e. install malware]&nbsp;<br \/>\n\u2022 [An attacker] can load arbitrary kernel extensions<\/p><\/blockquote>\n<h3>The technical stuff<\/h3>\n<p>A team of security researchers discovered that it&#8217;s possible to borrow exploits used for iPhone jailbreaking to attack the T2 chip. This is possible in part because the T2 is based on the A10 chip in the iPhone 7 and 7 Plus, two iPad models (6th and 7th generation), and the current iPod touch (7th gen).<\/p>\n<p>By leveraging the checkm8 exploit and blackbird vulnerability, a local attacker can gain full root access and kernel execution privileges on any Mac with a T2 chip.<\/p>\n<p>Since the flaw resides in read-only memory (ROM), Apple cannot simply release a firmware patch to protect affected Macs. According to researchers, Apple would need to physically replace hardware to fix the issue.<\/p>\n<p>Thankfully, FileVault 2 full disk encryption isn&#8217;t completely broken; an attacker still needs your password to access a FileVault-encrypted disk. However, an attacker could obtain that password by injecting a keystroke logger into the T2 firmware.<\/p>\n<p>It&#8217;s also noteworthy that the flaw does require an attacker to have physical access to a Mac.<\/p>\n<h3>How to protect your Mac from T2&#8217;s vulnerabilities<\/h3>\n<p>As scary as they may seem, most Mac users probably don&#8217;t need to worry too much about the T2 flaws.<\/p>\n<p>If you&#8217;re a politician, activist, journalist, government employee, someone with access to highly sensitive information or trade secrets, or if you travel internationally to certain countries, you&#8217;re more likely to be targeted by a sophisticated threat actor. Most other Mac users probably shouldn&#8217;t lose sleep over T2 exploits.<\/p>\n<p>However, i<span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">f you&#8217;re concerned about such attacks<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">, there are a few things you can do to help protect your Mac from exploitation.<\/span><\/p>\n<ol>\n<li><strong>Don&#8217;t let your Mac out of your sight.<\/strong> This includes at security checkpoints such as airport security or border crossings, especially when visiting a foreign country. If you need to travel internationally, consider bringing along a burner phone with a VPN, and leave your usual iPhone, iPad, or MacBook at home with someone you trust.<\/li>\n<li><strong>Don&#8217;t let your Thunderbolt, USB-C, or laptop power cables out of your sight.<\/strong> An attacker could swap out your cables for maliciously modified versions that are indistinguishable from Apple&#8217;s genuine cables. Researchers have <a href=\"https:\/\/9to5mac.com\/2020\/10\/13\/t2-exploit-team\/\" target=\"_blank\" rel=\"noopener noreferrer\">demonstrated<\/a> that T2 attacks and other attacks are achievable with a modified cable; a similar attack is demonstrated in the video below.<\/li>\n<li><strong>Buy a new Mac once Apple fixes these flaws.<\/strong><\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Introducing the OMG Keylogger Cable!<\/p>\n<p>Follow along for early access. It took us over a year to create, and we are happy to announce it during <a href=\"https:\/\/twitter.com\/defcon?ref_src=twsrc%5Etfw\">@defcon<\/a> once again. <\/p>\n<p>More info: <a href=\"https:\/\/t.co\/jASPCwJPGE\">https:\/\/t.co\/jASPCwJPGE<\/a> <a href=\"https:\/\/t.co\/AD5m6XwLOj\">pic.twitter.com\/AD5m6XwLOj<\/a><\/p>\n<p>&mdash; _MG_ (@_MG_) <a href=\"https:\/\/twitter.com\/_MG_\/status\/1291857948600221696?ref_src=twsrc%5Etfw\">August 7, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For many more technical details about the T2 flaws, you can refer to ironPeak&#8217;s write-up: <a href=\"https:\/\/securelist.com\/gravityrat-the-spy-returns\/99097\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Crouching T2, Hidden Danger<\/a>.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" sizes=\"(max-width: 50px) 100vw, 50px\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" alt=\"\" width=\"50\" height=\"50\" data-pagespeed-url-hash=\"2337344131\" \/><\/a>We discussed the T2 flaws\u00a0on <a href=\"https:\/\/podcast.intego.com\/156\">episode 158<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">subscribe<\/a> to make sure you don\u2019t miss any episodes. You\u2019ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for the latest Apple security and privacy news.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+DhZ3szCl?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple&#8217;s T2 chip is supposed to make Macs more secure, but it may do more harm than good. Here&#8217;s everything you need to know to protect your Mac from exploitation.<\/p>\n","protected":false},"author":14,"featured_media":92396,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[199,3913],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple&#039;s T2 chip is supposed to make Macs more secure, but it may do more harm than good. Here&#039;s everything you need to know to protect your Mac from exploitation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple&#039;s T2 security chip makes Macs unsecure - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple&#039;s T2 chip is supposed to make Macs more secure, but it may do more harm than good. Here&#039;s everything you need to know to protect your Mac from exploitation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-14T00:13:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-23T08:10:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Apple Mac T2 security chip with yellow warning sign exclamation emoji\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/\",\"name\":\"Apple's T2 security chip makes Macs unsecure - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#primaryimage\"},\"datePublished\":\"2020-10-14T00:13:21+00:00\",\"dateModified\":\"2020-10-23T08:10:55+00:00\",\"description\":\"Apple's T2 chip is supposed to make Macs more secure, but it may do more harm than good. Here's everything you need to know to protect your Mac from exploitation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple&#8217;s T2 security chip makes Macs unsecure\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple&#8217;s T2 security chip makes Macs unsecure\",\"datePublished\":\"2020-10-14T00:13:21+00:00\",\"dateModified\":\"2020-10-23T08:10:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#webpage\"},\"wordCount\":698,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png\",\"keywords\":[\"Mac Security\",\"T2 Chip\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple's T2 chip is supposed to make Macs more secure, but it may do more harm than good. Here's everything you need to know to protect your Mac from exploitation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/","og_locale":"en_US","og_type":"article","og_title":"Apple's T2 security chip makes Macs unsecure - The Mac Security Blog","og_description":"Apple's T2 chip is supposed to make Macs more secure, but it may do more harm than good. Here's everything you need to know to protect your Mac from exploitation.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2020-10-14T00:13:21+00:00","article_modified_time":"2020-10-23T08:10:55+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png","width":400,"height":260,"caption":"Apple Mac T2 security chip with yellow warning sign exclamation emoji"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/","name":"Apple's T2 security chip makes Macs unsecure - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#primaryimage"},"datePublished":"2020-10-14T00:13:21+00:00","dateModified":"2020-10-23T08:10:55+00:00","description":"Apple's T2 chip is supposed to make Macs more secure, but it may do more harm than good. Here's everything you need to know to protect your Mac from exploitation.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple&#8217;s T2 security chip makes Macs unsecure"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple&#8217;s T2 security chip makes Macs unsecure","datePublished":"2020-10-14T00:13:21+00:00","dateModified":"2020-10-23T08:10:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#webpage"},"wordCount":698,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png","keywords":["Mac Security","T2 Chip"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-t2-security-chip-makes-macs-unsecure\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2020\/10\/Apple-T2-chip-with-yellow-warning-sign-exclamation-emoji-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-o2f","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92395"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=92395"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92395\/revisions"}],"predecessor-version":[{"id":92409,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92395\/revisions\/92409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/92396"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=92395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=92395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=92395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}