After it was reported last week that Apple's T2 Security Chip could be vulnerable to jailbreaking, the team behind the exploit have released an extensive report and demonstration. Apple's custom-silicon T2 co-processor is present in newer Macs and handles encrypted storage and secure boot capabilities, as well as several other controller features. It appears that since the chip is based on an Appl
![Apple's T2 Security Chip Vulnerable to Attack Via USB-C](https://cdn-ak-scissors.b.st-hatena.com/image/square/c86e2bfbaf39bc1a1a18fa57997fc82bc7bdff3e/height=288;version=1;width=512/https%3A%2F%2Fimages.macrumors.com%2Ft%2FKN3q1EeKkILVQ_arpFZEfgiImdQ%3D%2F1600x%2Farticle-new%2F2020%2F10%2Ft2checkm8-1.jpg)