Can iPhone really be hacked, security researcher said this big thing on USB Type C
Tech News Desk,Worldwide, iPhones are considered number-1 in terms of privacy and security. But security researchers have claimed that the USB Type C controller of iPhone can be hacked.
Security researchers have claimed to have hacked the USB Type C controller of the iPhone. He has told that the Apple security provided in USB Type C installed in iPhone can be bypassed.
Security researcher Thomas Roth makes reverse engineering videos on hardware security. In his demonstration, Thomas has reverse engineered the ACE3 controller and made it hackable. Thomas reverse engineered Apple's ACE3 USB Type C controller and found that it could be hacked.
If we understand hardware reverse engineering in simple words, it is a process. In this process, any physical device has to be dismantled to understand its design and architecture. By separating all the components it is understood how they work.
Researchers use hardware reverse engineering to test the security of a product. By doing this, it can be found out what flaws are there in it and how secure it is from security point of view.
A video of the 38th Chaos Communication Congress held in Hamburg, Germany has surfaced. This four-day long conference has in-depth coverage on technology, society and utopia.
It is noteworthy that with iPhone 15, Apple started providing USB Type C port in its iPhones for the first time. The company uses ACE3 custom USB-C controller in its iPhones.
Talking about ACE3 controller, it is a special USB C controller chip used in Apple devices. This controller is used in iPhone 15 and other new iPhones. It is used for data transfer and charging. This is the company's proprietary chip which is available only in Apple devices. Security researchers have found a flaw in this ACE3 controller. According to Cyber Security News, cyber criminals can hack the iPhone by taking advantage of the flaws in the ACE3 USB Type C controller provided in this iPhone. During data transfer, hackers can steal sensitive information from the iPhone and can also bypass security protocols and inject malicious commands into the phone. It is noteworthy that the iPhone is charged and data transferred through USB Type C. Data transfer means that if USB Type C is hacked, iPhone users may face problems.
Comments are closed.