Apple M-Series Processor Has a “Unpatchable” Bug That Might Make Encrypted Data Accessible

A novel vulnerability in Apple’s M-series semiconductors has been identified as “unpatchable,” which might provide hackers access to decrypted data and secret keys stored on Mac computers.

According to recent research, there is a serious flaw in Apple’s M-series semiconductors that might allow malicious actors to obtain private encryption keys from MacBook computers.

A team of researchers from several US colleges released a study on March 21st, identifying the vulnerability as a side channel exploit that lets hackers steal end-to-end encryption keys when Apple chips run popular cryptographic protocols.

But unlike traditional vulnerabilities that can be fixed with straightforward patches, this specific problem is deeply ingrained in the silicon’s microarchitectural design, rendering it “unpatchable.”

Third-party cryptographic software would have to be used to fully fix the problem, which might seriously impair the performance of the Apple M-series chips—especially the M1 and M2 chips—in the early editions.

These results point to a significant weakness and difficulty with Apple’s hardware security framework. Hackers may be able to obtain sensitive data, including encryption keys used by cryptographic apps, by intercepting and using memory access patterns.

This kind of technique was named as a “GoFetch” exploit by the researchers. The hack requires standard user privileges, the same as those required by conventional applications, and operates without any issues within the user context.

Users in online Mac communities started to wonder whether there was now a need for serious worry or action regarding password keychains once the findings revealed.

One user expressed their belief that Apple will immediately address the issue with their operating system; if not, they would become “more concerned.”

Another user noted that Apple has been aware of this issue for some time and said that this is the reason the M3 includes “an additional instruction to disable DMP.” The user said that earlier studies on the subject, which began in 2022, were referred to as “auguries.”

This discovery coincides with Apple’s involvement in a protracted antitrust litigation against the United States Department of Justice (DOJ), which contends that Apple’s policies and “monopoly” in the Apple App Store unlawfully restricted competition and stifled innovation.

Additionally, the DOJ has claimed that Apple prevented developers from offering their own payment services to customers and blocked access to rival digital wallets that offer a “wide variety of enhanced features.”

Related Posts

pure bitcoin c213ce83f6e48a5c90ab8972e17de710

How to Insure Your Bitcoin Cold Storage: Policy Comparison and Cost

Introduction: The Hidden Risk of Cold Storage When it comes to safeguarding your Bitcoin, cold storage is often hailed as the gold standard. Hardware wallets, paper wallets, and even air-gapped…

Read more
633f77aa e12c 49b0 8f83 909431072a30 1

Best Signal-Provider Platforms for Professional Crypto Day Traders

  In the fast-moving world of cryptocurrency day trading, every second counts. One strong signal can be the difference between a profitable move and a costly error. That’s why professional…

Read more
image 15 1024x852 1

Top 7 Crypto Portfolio Tracker Apps for 2025 (Ranked by Fees, Sync Speed & Tax Reporting Accuracy)

Cryptocurrency investing has matured from a speculative hobby into a full-blown financial strategy. With more tokens, chains, and DeFi projects entering the market daily, managing your crypto portfolio manually just…

Read more
AdobeStock 193582713 e1651154504351

Why Every Crypto Investor Needs a Mobile Wallet with Fingerprint or Face ID – Top Picks for 2025

  The rise of digital assets has revolutionized the financial landscape, giving birth to a decentralized economy that’s open 24/7, borderless, and continuously evolving. As this revolution marches forward into…

Read more
69528071a8144fef7711fadbf034910a

Crypto Security 101: How to Detect Fake Wallet Apps, Airdrops & Phishing Links Before It’s Too Late

Crypto Security 101: How to Detect Fake Wallet Apps, Airdrops & Phishing Links Before It’s Too Late In a world where blockchain is redefining how we transact, invest, and store…

Read more
Benefits of Using a Cold Storage Wallet 1140x855 1

Best Cold Wallets for Storing Bitcoin Safely in 2025

Cold Wallets have become the gold standard for long-term Bitcoin storage, combining air-gapped security with user control. As the crypto space matures, 2025 brings new entrants and refinements to established…

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *