Unpatchable vulnerability in Apple chip leaks secret encryption keys

A newly discovered vulnerability baked into Apple’s M-series of chips allows attackers to extract secret keys from Macs when they perform widely used cryptographic operations, academic researchers have revealed in a paper published Thursday.

The flaw—a side channel allowing end-to-end key extractions when Apple chips run implementations of widely used cryptographic protocols—can’t be patched directly because it stems from the microarchitectural design of the silicon itself. Instead, it can only be mitigated by building defenses into third-party cryptographic software that could drastically degrade M-series performance when executing cryptographic operations, particularly on the earlier M1 and M2 generations. The vulnerability can be exploited when the targeted cryptographic operation and the malicious application with normal user system privileges run on the same CPU cluster.

Beware of hardware optimizations

The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before it’s actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel’s 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years.

Security experts have long known that classical prefetchers open a side channel that malicious processes can probe to obtain secret key material from cryptographic operations. This vulnerability is the result of the prefetchers making predictions based on previous access patterns, which can create changes in state that attackers can exploit to leak information. In response, cryptographic engineers have devised constant-time programming, an approach that ensures that all operations take the same amount of time to complete, regardless of their operands. It does this by keeping code free of secret-dependent memory accesses or structures.

The breakthrough of the new research is that it exposes a previously overlooked behavior of DMPs in Apple silicon: Sometimes they confuse memory content, such as key material, with the pointer value that is used to load other data. As a result, the DMP often reads the data and attempts to treat it as an address to perform memory access. This “dereferencing” of “pointers”—meaning the reading of data and leaking it through a side channel—is a flagrant violation of the constant-time paradigm.

Keep reading

Feds Can Film Your Front Porch for 68 Days Without a Warrant, Says Court

Law enforcement in Kansas recorded the front of a man’s home for 68 days straight, 15 hours a day, and obtained evidence to prove him guilty on 16 charges. The officers did not have a search warrant, using a camera on a pole positioned across the street to capture Bruce Hay’s home. A federal court ruled on Tuesday that it was fine for law enforcement to do so, in what’s potentially a major reduction in privacy law.

“Mr. Hay had no reasonable expectation of privacy in a view of the front of his house,” said the U.S. Tenth Circuit Court of Appeals in its decision on U.S. vs Hay. “As video cameras proliferate throughout society, regrettably, the reasonable expectation of privacy from filming is diminished.”

Hay, an Army veteran, was found guilty of lying about his disability status to collect benefits from the Department of Veteran Affairs (VA). However, the concerning part of this case stems from how VA officers collected evidence against Hay. The veteran appealed his case, arguing that the months-long surveillance of his home crossed a line. However, the federal court ruled that law enforcement can videotape the outside of your home, partially because of how prominent video cameras have become in society.

The federal court’s decision says that video cameras have become “ubiquitous,” and have therefore diminished our expectations of privacy. Police officers wear body cameras now, cellphones have cameras, and many doorbells record your porch. The court isn’t wrong that cameras are everywhere.

Keep reading

EXCAVATIONS OF 7,000-YEAR-OLD UNDERWATER VILLAGE REVEAL USE OF ADVANCED NAUTICAL TECHNOLOGY

Archaeological excavations off the coast of Rome in the Mediterranean Sea reveal that Stone Age people living over 7,000 years ago utilized sophisticated manufacturing techniques and advanced nautical technology in the construction and operation of their seafaring vessels.

According to an analysis published in the journal PLOS ONE, the ancient seafaring vessels discovered at the site are the oldest ever found in the Mediterranean, which may offer “invaluable insights” into the technological sophistication employed by Neolithic navigators.

“Direct dating of Neolithic canoes from La Marmotta reveals them to be the oldest in the Mediterranean, offering invaluable insights into Neolithic navigation,” the researchers explain. “This study reveals the amazing technological sophistication of early agricultural and pastoral communities, highlighting their woodworking skills and the construction of complex vessels.”

Keep reading

UNCANNY “ADAPTIVE DURABILITY” MAKES THIS STRANGE NEW MATERIAL STRONGER EVERY TIME YOU HIT IT

A team of engineers has invented a remarkable new material that gets stronger after an impact. The material’s creators also say it is electrically conductive, making it an ideal candidate for wearables or other electronics that are subject to repeated stresses and impacts.

Rather surprisingly, the inventors of their new material say the unique properties of corn starch, a common food additive, inspired their efforts.

“When I stir cornstarch and water slowly, the spoon moves easily,” explains Yue (Jessica) Wang, a materials scientist and the project’s principal investigator. “But if I lift the spoon out and then stab the mixture, the spoon doesn’t go back in. It’s like stabbing a hard surface.”

Scientists call this variable state adaptive durability, meaning the strength of the material shifts from a generally malleable state to a more durable one after a type of force is applied. Since many electronic devices such as mobile phones, tablet PCs, and electronic-based wearables could benefit from this type of durability, the researchers behind this latest invention wanted to see if they could imbue a relatively stretchable, malleable with this property. If successful, the resulting material could form the basis for electronic devices that don’t break like a dropped phone but instead actually become stronger through repeated use.

Unfortunately, most metals and other materials with high electronic conductivity are hard and brittle, presenting the developers of this seemingly ‘magical’ material with a formidable barrier. However, recent advances in material sciences have resulted in a class of materials called conjugated polymers that are both stretchy and conduct electricity. Still, these types of polymers, which ae composed of tiny, spaghetti-like molecules, tend to break apart under repeated stresses.

These circumstances motivated Professor Wang and her University of California, Merced engineering team to see if they could find a combination of conjugated polymers that were not only durable but became more sturdy with repeated uses.

First, the researchers combined a solution of four polymers. According to the release announcing the new material, this “poly (2-acrylamido-2-methylpropanesulfonic acid), shorter polyaniline molecules and a highly conductive combination known as poly (3,4-ethylenedioxythiophene) polystyrene sulfonate (PEDOT:PSS). After mixing them, Wang’s team spread the mixture out into a thin film and let it dry.

As expected, the resulting material was stretchy and electrically conductive. However, the real question was how the material would react to hitting it with a hammer. If it reacted like other conjugated polymers, it would weaken and break apart, leaving the researchers back where they started. However, when they tested their material, they found something else altogether.

“Rather than breaking apart from very rapid impacts, it deformed or stretched out,” they explain. “The faster the impact, the more stretchy and tough the film became.” Just like the cornstarch solution, the added force of the impacts resulted in adaptive durability, making a stronger, more durable material than the team started with.

Keep reading

Man, 62, in Boston is given a PIG’S kidney just days after Chinese doctors transplanted liver from hog into 50-year-old patient, in twin medical breakthroughs

Animal to human transplant science took a major step forward this week after surgeons transplanted a kidney and a liver from pigs into humans.

In Boston, an ailing 62-year-old man received a genetically-altered kidney from a pig in a world first.

The new organ began to produce urine almost immediately, doctors at Mass General said, and the patient is already walking the hospital’s halls. He may soon be discharged.

At the same time in China, a 50-year-old man became the first person to receive a genetically-engineered liver from a pig — which was kept in his body for ten days.

Surgeons say the organ’s color and texture appeared ‘normal’ upon extraction and that it was even secreting bile — a fluid aiding digestion — in a sign it was working. 

Both breakthroughs could offer hope for new ways to supply hospitals with organs for transplants, as the waiting list runs into years. 

Keep reading

Weaponizing Reality: The Dawn of Neurowarfare

Billionaire Elon Musk’s brain-computer interface (BCI) company Neuralink made headlines earlier this year for inserting its first brain implant into a human being. Musk says such implants, which are described as “fully implantable, cosmetically invisible, and designed to let you control a computer or mobile device anywhere you go,” are slated to eventually offer “full-bandwidth data streaming” to the brain. 

Brain-computer interfaces (BCIs) are quite the human achievement: as described by the University of Calgary, “A brain computer interface (BCI) is a system that determines functional intent – the desire to change, move, control, or interact with something in your environment – directly from your brain activity. In other words, BCIs allow you to control an application or a device using only your mind.” 

Developers and advocates of BCIs and adjacent technologies emphasize that they can help people regain abilities lost due to aging, ailments, accidents or injuries, thus improving quality of life. A brain implant created by Swiss-based École Polytechnique Fédérale in Lausanne (EPFL), for example, has allowed a paralyzed man to walk again just by thinking. Others go further: Neuralink’s goal is to help people “surpass able-bodied human performance.”

Yet, great ethical concerns arise with such advancements, and the tech is already being used for questionable purposes. To better plan logistics and boost productivity, for example, some Chinese employers have started using “emotional surveillance technology” to monitor workers’ brainwaves which, “combined with artificial intelligence algorithms, [can] spot incidents of workplace rage, anxiety, or sadness.” The example showcases how personal the technology can become as it is normalized in daily life. 

But the ethical ramifications of BCIs and other emerging neurotechnologies don’t stop at the consumer market or the workplace. Governments and militaries are already discussing — and experimenting on — the roles they could play in wartime. Indeed, many are describing the human body and brain as war’s next domain, with a 2020 NATO-backed paper on “cognitive warfare” describing the phenomenon’s objective as “mak[ing] everyone a weapon…The brain will be the battlefield of the 21st century.” 

On this new “battlefield,” an era of neuroweapons, which can broadly be defined as technologies and systems that could either enhance or damage a warfighter or target’s cognitive and/or physical abilities, or otherwise attack people or critical societal infrastructure, has begun.

Keep reading

Google’s Woke AI Wasn’t a Mistake. We Know. We Were There.

It was a display that would have blown even Orwell’s mind: search for images of “Nazis” and Google’s AI chatbot shows you almost exclusively artificially generated black Nazis; search “knights” and you get female, Asian knights; search “popes” and it’s women popes. Ask it to share the Houthi slogan or define a woman, and Google’s new product says that it will not in order to prevent harm. As for whether Hitler or Elon Musk is more dangerous? The AI chatbot says that it is “complex and requires careful consideration.” Ask it the same question about Obama and Hitler and it will tell you the question is “inappropriate and misleading.”

The world has been horrified—and amused—by the extreme ideological bent of Gemini, Google’s much-hyped new AI tool, which the company launched last month.

But Shaun Maguire, who was a partner at Google Ventures, the company’s investment wing, from 2016 until 2019, had a different reaction. 

“I was not shocked at all,” he told The Free Press. “When the first Google Gemini photos popped up on my X feed, I thought to myself: Here we go again. And: Of course. Because I know Google well. Google Gemini’s failures revealed how broken Google’s culture is in such a visually obvious way to the world. But what happened was not a one-off incident. It was a symptom of a larger cultural phenomenon that has been taking over the company for years.”

Maguire is one of multiple former Google employees who told The Free Press that the Gemini fiasco stems from a corporate culture that prioritizes the ideology of diversity, equity, and inclusion (DEI) over excellence and good business sense. 

Keep reading

Globalists are constructing AI-powered control grid designed to end independent journalism and free speech on the internet

We’ve heard some disturbing reports out of Canada and the U.S. recently that shouldn’t be viewed in a vacuum. A trend is developing.

Last Friday, March 15, Rebel News reporter David Menzies was arrested while trying to interview attendees at a Pro-Hamas rally in Toronto.

According to Rebel News, the arrest came just days after the announcement of David’s lawsuit against the Royal Canadian Mounted Police “for a pattern of intimidation and exclusion following shocking displays of police brutality against David.”

Rebel News reports that what transpired was a blatant disregard for civil liberties.

David was in full compliance with the law, Rebel News reported, noting that he presented his identification upon request. All of this was captured on camera.

Yet, he was arrested and detained for exercising his right to document a public event.

In the U.S., we have also seen reporters hauled off to jail recently for simply covering events that the government didn’t want covered. Just two weeks ago the FBI arrested Steve Baker, a reporter for Blaze Media, for his coverage of the J6 event. Last year, the FBI arrested journalist Owen Shroyer of Infowars and he was convicted and sentenced to 60 days in prison for his coverage of J6 (he did not even enter the Capitol that day). NBC News, a key part of the state-run media in America, dutifully reported upon Shroyer’s conviction that he was not a journalist but a “conspiracy theorist.”

Keep reading

SECRET PENTAGON PROGRAM ECHOES PEDOPHILE RING IN “TRUE DETECTIVE” SERIES

THE PENTAGON IS pursuing a high-tech program that will “minimize cognitive burden” on soldiers, according to budget documents released last week. The $40 million-plus classified program, codenamed “CARCOSA,” shares the same name as “the temple” in the first season of the HBO TV series “True Detective,” a place where an elite pedophile ring performs ritual abuse on children.

The program is overseen by the Defense Advanced Research Projects Agency, or DARPA, the Pentagon’s premier organization funding the development of futuristic weapons and military capabilities. 

There is of course no evidence that the military’s CARCOSA is involved in anything like that; but it’s unclear why, at a time when the White House has prioritized fighting “dangerous conspiracy theories,” DARPA is providing the conspiracy crowd with such fodder. The Intercept reached out to DARPA to inquire whether the elite research agency was aware of the strange coincidence or whether there’s a “True Detective” fan at the agency. DARPA did not respond at the time of publication.

The Pentagon’s CARCOSA is its own temple of information, an AI-driven aggregator that is intended to acquire, sort, and display the blizzard of information that reflects what is going on on a fast-moving future battlefield. “The Carcosa program is developing and demonstrating cyber technologies for use by warfighters during tactical operations,” DARPA’s new fiscal year 2025 budget request says. “Carcosa cyber technology aims to provide warfighters in the field with enhanced situational awareness of their immediate battlespace.

CARCOSA, DARPA says, will help to “minimize cognitive burden on tactical cyber operators.” In other words, headaches caused by the same information overload we all have to deal with everyday. Individual cyber warriors on high-intensity battlefields such as Ukraine and Israel are inundated with data, from their own communications and IT systems, from a virtual Niagara of intelligence inputs, and from electronic attacks via computers, machines, and drones. On top of it all, the modern battlefield is a venue for “information operations,” which seek to manipulate what the enemy sees and believes.

CARCOSA will support an Army mission area called Cyberspace and Electromagnetic Activities, or CEMA, which provides battlefield commanders “with technical and tactical advice on all aspects of offensive and defensive cyberspace and electronic warfare operations.” The Army says CEMA operators are so inundated with information that they need augmented intelligence technology to help sort the signal from the noise.

CARCOSA stands for Cyber-Augmented Reality and Cyber-Operations Suite for Augmented Intelligence. “Augmented reality” refers to immersive technology that produces computer-generated images overlaying a user’s view of the real world, like Apple’s Vision Pro headset. The program supports development of various technologies, at least according to vague budget documents, all of which seek to defeat a new reality of combat: Individual soldiers and commanders can’t process all of the information that they are bombarded with. 

The full CARCOSA name, which has not been previously reported, appears in a November $26 million DARPA contract to Two Six Labs, a part of Two Six Technologies and owned by the Carlyle Group. Two Six Labs says it supplies “situational awareness interfaces for cyber operators to distributed sensor networks, from machine learning models that learn to reverse engineer malware to embedded devices that enable and protect our nation’s warfighters.” 

“We want to do everything we can to help the US government and the intelligence community,” says Two Six Technologies CEO Joe Logue. “Starting from over here for information operations and influence up through cyber, command control and operations.” In its three years of operations, the Arlington, Virginia, based company has doubled its national security contracts to some $650 million.

“DARPA’s Cyber-Augmented Operations, also known as CAOs, are a vast spectrum of military programs many of which seek to enhance, if not replace, humans with machines,” says Annie Jacobsen, author of “The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top-Secret Military Research Agency.”

Keep reading

Chinese Scientists Implant First Pig Liver Into Brain-Dead Human

Who says nothing interesting ever happens in the world anymore? This week, in a “first of its kind” operation, a brain-dead human subject was implanted with the world’s first gene-edited pig liver transplant, according to SCMP

In what could be a pioneering move, Chinese scientists have transplanted a gene-edited pig liver into a human, aiming to potentially mark a solution to organ shortages, the report says.

The liver was modified to reduce rejection risks and was implanted into a brain-dead recipient, showing no rejection signs four days post-operation, as per the Air Force Medical University. SCMP writes that this procedure could significantly aid those with end-stage liver disease, possibly revolutionizing liver transplants. 

Gene editing advancements in China also promise to enhance efficiency and accessibility in plant modification, reflecting broader strides in medical innovation, the report continues.

Keep reading