bitcoin
bitcoin

$97968.892617 USD

4.20%

ethereum
ethereum

$3467.682799 USD

2.53%

tether
tether

$0.999620 USD

0.09%

xrp
xrp

$2.306032 USD

3.11%

bnb
bnb

$697.970719 USD

1.42%

solana
solana

$199.309807 USD

5.88%

dogecoin
dogecoin

$0.336490 USD

5.10%

usd-coin
usd-coin

$1.000336 USD

0.03%

cardano
cardano

$0.930878 USD

2.48%

tron
tron

$0.256246 USD

1.88%

avalanche
avalanche

$41.285023 USD

7.82%

chainlink
chainlink

$25.042724 USD

5.00%

toncoin
toncoin

$5.872340 USD

5.56%

shiba-inu
shiba-inu

$0.000024 USD

6.13%

sui
sui

$4.600410 USD

-1.41%

Cryptocurrency News Articles

Apple M-Series Chip Vulnerability: Crypto Assets at Risk

Mar 24, 2024 at 06:53 am

A newly discovered vulnerability in Apple's M1, M2, and M3 series chips, which power their latest devices, exposes users to potential crypto theft. The "GoFetch" exploit allows attackers to manipulate the CPU to steal cryptographic keys, essential for data privacy and software crypto wallets on Apple devices. The exploit targets high-value targets with substantial cryptocurrency holdings and poses a significant threat to web browser encryption and applications like MetaMask. Apple has acknowledged the vulnerability but its response has been criticized for not providing a complete fix. Users, especially those with significant cryptocurrency holdings, are advised to remain vigilant and take appropriate measures to protect their digital assets.

Apple M-Series Chip Vulnerability: Crypto Assets at Risk

A Critical Vulnerability in Apple's M-Series Chips: Are Your Crypto Assets at Risk?

Recent revelations have brought to light a concerning vulnerability in Apple's M1, M2, and M3 series chips, which power their latest devices. This flaw poses a significant threat to users' cryptographic keys, leaving their data privacy and cryptocurrency holdings exposed to potential theft.

What Does the "GoFetch" Exploit Mean for You?

The "GoFetch" exploit, meticulously documented by researchers from esteemed institutions like the University of Illinois Urbana-Champaign and the University of Washington, leverages Data Memory-Dependent Prefetchers (DMPs) within the chips to access the CPU cache. By monitoring the subtle side effects of secret-dependent cache accesses, attackers can surreptitiously infer a victim program's sensitive data, even if the attacker and victim share no common memory.

Apple's Response: Mitigation or Shortcomings?

Apple has acknowledged the researchers' findings and issued a developer post outlining a potential mitigation strategy. However, this workaround may introduce performance penalties as it requires assuming worst-case processing speeds to prevent cache invocation. The responsibility for implementing these changes lies with MacOS software developers, not the users themselves.

Experts' Concerns: A Patch in Time Not Given?

Despite Apple's response, some experts have expressed concerns about its adequacy. Journalist Kim Zetter highlights that Apple implemented a fix for the vulnerability in its October-released M3 chips but failed to promptly inform developers, hindering their ability to enable the patch. Consequently, the onus now falls on wallet providers like MetaMask and Phantom to implement their own patches to safeguard against the exploit.

A Reminder: No System Is Impervious

Apple devices have traditionally enjoyed a reputation for security due to the inherent design of MacOS and iOS. However, a separate report from cybersecurity firm Kaspersky in January underscores the growing threat of malware targeting both Intel and Apple Silicon devices. Specifically, the malware targeted Exodus wallet users, duping them into downloading a malicious software version.

Cloudbet: A Secure Haven for Aviator Gaming and More

Cloudbet, a leading Aviator casino established in 2013, boasts an impressive track record in online gaming and e-sports betting. With over 100,000 users, it prioritizes security by storing customer funds in cold storage. Its user-friendly interface and diverse game collection, including slots, table games, and virtual games, cater to a wide range of preferences. Players can utilize multiple currencies or opt for 'free play' to explore games without financial risk.

Conclusion: Vigilance and Proactive Measures

While Apple devices are generally regarded as secure, the newly discovered vulnerability in their latest chips serves as a sobering reminder that no system is immune to threats. Users, particularly those with substantial cryptocurrency holdings, should exercise vigilance and stay abreast of any developments or patches to safeguard their digital assets.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Dec 25, 2024