• Learning center

83. T2 chip introduction
In the video, we are going to learn about Apple's T2 chip.
Detail
Comments

1

00:00:00,433 --> 00:00:04,000

Hello everyone, today we are going to learn about Apple's T2 chip

2

00:00:05,800 --> 00:00:09,400

Apple's T2 chip is a custom chip built on ARM's architecture

3

00:00:10,966 --> 00:00:19,666

Mainly used for security protection, such as device keys, fingerprint data, system startup process and so on

4

00:00:21,933 --> 00:00:28,366

In addition, the T2 chip can forcibly turn off the microphone, and it's a hardware-level turn off

5

00:00:29,866 --> 00:00:36,766

Even if a hacker breaks the system, or even the T2 chip, they can't stop the microphone from turning off

6

00:00:42,333 --> 00:00:47,600

If the third-party repair shop replaces the T2 chip without authorization,

7

00:00:48,900 --> 00:00:52,666

the laptop will not work properly and cannot be turned on

8

00:00:58,433 --> 00:01:01,600

As long as the computer is equipped with T2 chip,

9

00:01:01,866 --> 00:01:06,000

replacing other accessories will also lead to abnormal startup

10

00:01:07,833 --> 00:01:13,200

The actual T2 chip is shown in the picture below, with the words T2 on it

11

00:01:16,666 --> 00:01:24,100

This T2 is an evolution of the original T1 chip, the predecessor of T2 is T1,

12

00:01:25,300 --> 00:01:27,833

which is used for security protection

13

00:01:31,566 --> 00:01:35,400

It is a two-layer chip, the bottom layer is the processor,

14

00:01:39,200 --> 00:01:41,133

and the top layer is the running memory,

15

00:01:41,533 --> 00:01:44,066

which is the running space of this T2 chip

16

00:01:46,666 --> 00:01:49,266

There is a power supply chip next to it,

17

00:01:49,966 --> 00:01:54,233

which outputs power to meet the normal working requirements of T2

18

00:01:56,133 --> 00:01:58,900

The specific protection of this T2 chip,

19

00:01:59,066 --> 00:02:00,200

let's take a look

20

00:02:02,500 --> 00:02:07,500

Any mac equipped with the T2 chip can enable a safe boot feature at boot time,

21

00:02:07,900 --> 00:02:09,766

and this is the safe boot

22

00:02:11,966 --> 00:02:14,100

But once you enable this feature,

23

00:02:16,800 --> 00:02:22,333

you can ensure that your MAC is always booted from a legitimate, authenticated system

24

00:02:26,266 --> 00:02:31,700

To prevent malware from running from the bottom of the system, including Windows

25

00:02:36,766 --> 00:02:41,333

This function can be turned on or off at the user's discretion

26

00:02:48,333 --> 00:02:53,000

In terms of data protection, there is also a hardware aspect involved

27

00:02:53,833 --> 00:02:58,200

The T2 chip is equipped with a dedicated AES encryption engine,

28

00:02:59,266 --> 00:03:03,000

which is mainly used to protect data on SSD

29

00:03:05,900 --> 00:03:10,533

Even if you remove the hard drive and plug it into another MAC, it won't work

30

00:03:12,600 --> 00:03:17,833

In terms of fingerprint, it is the same as the previous T1 chip in that

31

00:03:17,833 --> 00:03:21,000

it is also responsible for fingerprint storage,

32

00:03:22,533 --> 00:03:25,333

and it will be managed by an independent area

33

00:03:36,866 --> 00:03:40,600

The fingerprint data, which is stored on the T2 chip,

34

00:03:41,166 --> 00:03:43,133

is not a concrete image,

35

00:03:43,466 --> 00:03:45,600

it is an encrypted digital form

36

00:03:45,966 --> 00:03:51,833

And this encrypted digital form cannot be read and accessed by another software or system

37

00:03:55,000 --> 00:03:59,833

This data is only called for matching when the user authenticates the fingerprint

38

00:04:04,000 --> 00:04:07,300

The T2 chip manages the camera, microphone,

39

00:04:07,300 --> 00:04:10,433

speaker, and much of the hardware on a mac

40

00:04:16,700 --> 00:04:23,300

In the past, some software might have tried to surreptitiously wake up cameras and microphones

41

00:04:23,300 --> 00:04:25,966

to collect private data about users

42

00:04:28,966 --> 00:04:34,466

Even if we close the laptop, there may be situations that the microphone is called

43

00:04:38,400 --> 00:04:43,600

So what the T2 chip does is it disconnects the software directly from the hardware

44

00:04:43,600 --> 00:04:46,766

with this built-in audio and video controller

45

00:04:50,800 --> 00:04:53,300

So the T2 chip acts as a middleman

46

00:04:56,700 --> 00:04:59,833

If any software wants to access the hardware,

47

00:05:00,800 --> 00:05:04,000

it must first get permission from the T2 chip

48

00:05:07,533 --> 00:05:10,966

So those are some of the features of the T2 security chip,

49

00:05:15,466 --> 00:05:18,700

and I'll see you in the next video on the architecture of it

50

00:05:23,633 --> 00:05:25,733

Okay, so this is the T2 chip

No comments yet
Come and write your comments
Links: