From the article: "On average, the marijuana users who participated in the study consumed the drug three times per day."
^ Of course there's a brain decline if you smoke it 3 times a day. That's being perpetually high. If you drink alcohol heavily 3 times a day you'll also decline pretty rapidly.
If you look at the design of the Secure Enclave's Key Derivation Function it pulls in data from a unique ID burned in by the manufacturer and a small pin code provided by the customer. Apple claims it can not get the data because it knows neither the UID or the code.
However, the manufacturer of the Secure Enclave does/will know the UID and a user passcode can easily be brute forced. If law enforcement have enough leverage to get UIDs then the system is moot.
My impression of Apple's UID is that it's a physical unclonable function[1] whose output is directly connected to the key derivation circuitry. This means that there is, absent physically destructive attacks or side-channel vulnerabilities in the key derivation circuitry, no way to recover the UID/PUF output. Since PUFs typically get their values from random process variation, their values cannot be known before manufacturing. Since it can be used, in very well-defined operations with inherent rate limiting, but cannot be read out directly, there is no economically-feasible way to recover their values after manufacturing, either.
Of course, this is mostly speculation and would need some serious ChipWorks-style reverse engineering to determine if it's true, but that's my impression given what I've read from Apple's security documentation.
> Since PUFs typically get their values from random process variation
How sure are we that this is the case, and how can we verify it? You can burn in whatever bits you want to the PUF. If there is a list, a product to UID mapping, a deterministic UID generation process or even PRNG that isn't strong enough the Secure Enclave falls.
Well, again, I can't be sure, and you can't verify without reverse engineering the chip.
But that's not how PUFs work. The whole point of a "physical unclonable function" is that it's not just a set of bits that can be programmed to an arbitrary value; it's a part of a circuit which, based on physical characteristics of the apparatus, deterministically generates a response to a given challenge. The idea is that there is no such list for the PUF internal values--they're not controllable, and it would be extremely difficult to read their internal state without destroying the chip. Making lists would be very awkward: according to the Apple iOS Security Guide[1], the KDF takes 80ms per passcode attempt. So, generating a list of PUF outputs for all 10,000 4-digit numeric passcode would take Apple ~14 minutes--and it must be done on each device.
So, it's theoretically possible that Apple spends 14 minutes per device making a list of PUF outputs given all 4-digit numeric passcodes. However, a user who uses any other passcode would be completely unaffected (except having the search space reduced by 10,000), and I consider it highly unlikely that Apple can afford 14 minutes per device just for potential nefarious use given the volumes they produce.
Also, note that almost all other keys are 'tangled' with the output of the PUF, so a PRNG failure is not likely to cause predictable keys, depending on the failure mode and what PUF stimuli Apple records.
Of course, this is all a moot point, as none of this is verifiable (at least, to me and you).
Actually, it does not look like the UID is a PUF - although it's a very interesting idea!
"Unique ID (UID) - A 256-bit AES key that’s burned into each processor at manufacture. It cannot be read by firmware or software, and is used only by the processor’s hardware AES engine. To obtain the actual key, an attacker would have to mount a highly sophisticated and expensive physical attack against the processor’s silicon. The UID is not related to any other identifier on the device including, but not limited to, the UDID." - https://www.apple.com/ipad/business/docs/iOS_Security_Feb14....
> "To obtain the actual key, an attacker would have to mount a highly sophisticated and expensive physical attack against the processor’s silicon."
This is not true if the UID is generated in some way that allows pilfering by the manufacturer.
> So, generating a list of PUF outputs for all 10,000 4-digit numeric passcode would take Apple ~14 minutes--and it must be done on each device.
The threat model here is not Apple, but the manufacturer. In this case the options I mentioned earlier would allow very fast attacks that could be launched selectively at target devices later on.
> Of course, this is all a moot point, as none of this is verifiable (at least, to me and you).
Definitely not verifiable of falsifiable by you or by me. I would suggest however that the claims and reputation of the Secure Enclave is not deserved. Finally, in crypto, skepticism is a feature.
@xnull: interesting, my download of that file has slightly different text:
The device’s unique ID (UID) and a device group ID (GID) are AES 256-bit keys *fused* into the application processor during manufacturing. No software or firmware can read them directly; they can see only the results of encryption or decryption operations performed using them. The UID is unique to each device and is not recorded by Apple or any of its suppliers.
(emphasis added)
That language, along with this gem later:
The passcode is “tangled” with the device’s UID, so brute-force attempts must be performed on the device under attack
lead me to believe they're describing a PUF.
By the way, can you save a local copy of that file? My SHA256 is b9d1f5290ebe56780af692e2b12037d6b7e085ef1f6050c1e27ea8426f94bfcc, what's yours?
>The threat model here is not Apple, but the manufacturer. In this case the options I mentioned earlier would allow very fast attacks that could be launched selectively at target devices later on.
Right, I understand. No matter what Apple says, you can't verify, so you can't trust.
>Definitely not verifiable of falsifiable by you or by me. I would suggest however that the claims and reputation of the Secure Enclave is not deserved. Finally, in crypto, skepticism is a feature.
Well, who am I to say whether Secure Enclave lives up to its hype? But definitely agreed about skepticism...
The UK does not tax worldwide income. In fact, if you hold your money in an offshore account, you can declare yourself a "non-domiciled" UK person. This special category exempts you from all tax on foreign income in exchange for a small fee.
It is not for no reason that every corrupt Russian oligarch and oil baron and African dictator flocks to London.
UK does not tax worldwide income based on UK citizenship, but it does tax worldwide income for all UK domiciled residents, which includes all citizenship-seeking immigrants.
Your trivia on the non-domicile status is interesting, but both the grandparent and myself have already mentioned it, and I specifically said that it's "irrelevant to this analysis".
It is fundamentally oppressive and undemocratic to deny free men the chance to voluntary come together to collectively set the prices for the services they're selling.
This collective bargaining is called price-fixing.*
This isn't a clear-cut issue of rights that can be settled on principle. Workers have been given the right to collectively fix prices through unions not because it's a fundamental freedom, but because it has been recognised that employees negotiate from a position of relative weakness to their employer.
In what sense "more efficient"? There is nothing that says that just because some people have become better at making money the market as a whole is working better.
Your argument is predicated on the assumption that the rich use their wealth only for the "important forms" you mention. What you don't mention is how they are able to influence the political arena with their wealth. The influence of politics by a few is a very natural consequence of massive inequality, and is a zero-sum game. More political influence of the wealthy means less political influence of the poor.
^ Of course there's a brain decline if you smoke it 3 times a day. That's being perpetually high. If you drink alcohol heavily 3 times a day you'll also decline pretty rapidly.