@sven And out of curiosity, I was looking for more information and I found this fairly recent paper that seems to be a good summary of the Apple Security. https://arxiv.org/pdf/2510.09272
Just to mention, because I didn't find the link on Asahi Documentation.
CPeron
@cperon@mstdn.social
0
Followers
0
Following
Joined November 13, 2022
Posts
Open post
In reply to
CPeron
@cperon@mstdn.social
mstdn.social
@sven I would have been happy to hear the solutions for M4/M5.
In the slide -> emulate GL2 on a "regular" ARM CPU -> Means you boot in "raw boot object" and then try to emulate all the Apple specific ISA extensions that are disabled in this mode right ?
Instead of emulating can't we pass this ISA to another Apple silicon ?
In the slide -> emulate GL2 on a "regular" ARM CPU -> Means you boot in "raw boot object" and then try to emulate all the Apple specific ISA extensions that are disabled in this mode right ?
Instead of emulating can't we pass this ISA to another Apple silicon ?
2
1
0
0