Hacker News new | past | comments | ask | show | jobs | submit login

iCloud Keychain escrow data is encrypted by HSM clusters that have administrator keys destroyed; if Apple tried to compromise a keychain by installing malicious HSMs users would first get notified that their data had been lost due to failed/destroyed HSMs.



See my response to sibling. Explain to me how you prove iOS software can’t be malicious.


Explain to me how you can prove…

1. You aren’t a troll posing as a human

2. That if you are a human, that you won’t die in the next hour.

3. That if you don’t die today, that the Earth won’t be impacted by an asteroid this year.


Trusted computing is a technical concept. People use Bitcoin because it’s provably secure against clearly outlined threats, not because they trust some vendor. Apple and a certain group of fans want to present iOS as a trusted computing platform for certain use cases, but it’s not.

Anyway, I see you’re just trolling here, so there’s no point talking to you.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: