When Apple integrated their iPhone SoC into the Mac the goal was to
create a more secure device. We have performed thoughtful, complete analysis of the T2 and it creates
more problems then it solves. Now thanks to axi0mX's
checkm8 we are opening research and development on the T2 platform.
This is the result of a years work of research and development, read our story here
efivalidatefor T1 and Prior Macs
Verifying the security of the EFI firmware of Mac's prior is just as important. While it requires a specialzed cable and removing the back cover,
efivalidate makes it possible to check the SPI flash chip of these Macs.
cnklverifyApple File Verification
The security of the macOS boot process relies on "chunklist" files such as
BaseSystem.chunklist. This tool allows for the extraction of public keys from the kernel and verification of a chunklist signed file.
in developmenta Toolchain for bridgeOS
Apple may not have intended developers to target the T2 as a development platform, but that doesn't mean it cant be one.
coming soonT2 and bridgeOS Development Resources
Knowledge is power. The collection of secret knowledge related to the Mac and the T2.