Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm sure it'll be impervious to any attack vector just like the T2 chip. Oh, wait. Ooops.

I'm sure all of the hackers are having a field day looking for vulns in the new chip. It'd be a hacker's fantasy to be the first one to find something on the brand new chip.



The core design is largely identical to the Apple's mobile processor line.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: