Security researcher Thomas Rotoval demonstrated at the 38th Chaos Communication Congress a successful hack of the Apple ACE3 controller, which is used in USB-C iPhone and Mac devices.
Roth reverse engineered the controller to gain access to its firmware and communication protocols. He was then able to reprogram the controller, passing a security check and embedding the code. This allows you to connect uncertified accessories and perform actions without the user’s consent.
The researcher reported his previous ACE2 attack and the new ACE3 attack to Apple.
Regarding the handling of ACE2 (software), they first confirmed that they would fix it in the fall of 2024, but then notified me that they would not be fixing it because it was a hardware issue.
Thomas Roth, security researcher
In the case of ACE3, Roth said Apple “saw the action taken and said they didn’t see it as a threat – I agree with that sentiment, but I’d like to at least get the word out there!”
Roth also said that several Apple repair specialists have already said his research is useful for diagnosing and repairing broken Macs.
While controller hacking does raise questions about data and device security, iPhone and Mac owners shouldn’t worry just yet.
The Roth method is extremely complex, requiring scientific technical knowledge, special equipment and network access to the device. The researcher himself is hacking “basic research.” [Forbes]
Source: Iphones RU

I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.