1
00:00:00,433 --> 00:00:04,000
Hello everyone, today we are going to learn about Apple's T2 chip
2
00:00:05,800 --> 00:00:09,400
Apple's T2 chip is a custom chip built on ARM's architecture
3
00:00:10,966 --> 00:00:19,666
Mainly used for security protection, such as device keys, fingerprint data, system startup process and so on
4
00:00:21,933 --> 00:00:28,366
In addition, the T2 chip can forcibly turn off the microphone, and it's a hardware-level turn off
5
00:00:29,866 --> 00:00:36,766
Even if a hacker breaks the system, or even the T2 chip, they can't stop the microphone from turning off
6
00:00:42,333 --> 00:00:47,600
If the third-party repair shop replaces the T2 chip without authorization,
7
00:00:48,900 --> 00:00:52,666
the laptop will not work properly and cannot be turned on
8
00:00:58,433 --> 00:01:01,600
As long as the computer is equipped with T2 chip,
9
00:01:01,866 --> 00:01:06,000
replacing other accessories will also lead to abnormal startup
10
00:01:07,833 --> 00:01:13,200
The actual T2 chip is shown in the picture below, with the words T2 on it
11
00:01:16,666 --> 00:01:24,100
This T2 is an evolution of the original T1 chip, the predecessor of T2 is T1,
12
00:01:25,300 --> 00:01:27,833
which is used for security protection
13
00:01:31,566 --> 00:01:35,400
It is a two-layer chip, the bottom layer is the processor,
14
00:01:39,200 --> 00:01:41,133
and the top layer is the running memory,
15
00:01:41,533 --> 00:01:44,066
which is the running space of this T2 chip
16
00:01:46,666 --> 00:01:49,266
There is a power supply chip next to it,
17
00:01:49,966 --> 00:01:54,233
which outputs power to meet the normal working requirements of T2
18
00:01:56,133 --> 00:01:58,900
The specific protection of this T2 chip,
19
00:01:59,066 --> 00:02:00,200
let's take a look
20
00:02:02,500 --> 00:02:07,500
Any mac equipped with the T2 chip can enable a safe boot feature at boot time,
21
00:02:07,900 --> 00:02:09,766
and this is the safe boot
22
00:02:11,966 --> 00:02:14,100
But once you enable this feature,
23
00:02:16,800 --> 00:02:22,333
you can ensure that your MAC is always booted from a legitimate, authenticated system
24
00:02:26,266 --> 00:02:31,700
To prevent malware from running from the bottom of the system, including Windows
25
00:02:36,766 --> 00:02:41,333
This function can be turned on or off at the user's discretion
26
00:02:48,333 --> 00:02:53,000
In terms of data protection, there is also a hardware aspect involved
27
00:02:53,833 --> 00:02:58,200
The T2 chip is equipped with a dedicated AES encryption engine,
28
00:02:59,266 --> 00:03:03,000
which is mainly used to protect data on SSD
29
00:03:05,900 --> 00:03:10,533
Even if you remove the hard drive and plug it into another MAC, it won't work
30
00:03:12,600 --> 00:03:17,833
In terms of fingerprint, it is the same as the previous T1 chip in that
31
00:03:17,833 --> 00:03:21,000
it is also responsible for fingerprint storage,
32
00:03:22,533 --> 00:03:25,333
and it will be managed by an independent area
33
00:03:36,866 --> 00:03:40,600
The fingerprint data, which is stored on the T2 chip,
34
00:03:41,166 --> 00:03:43,133
is not a concrete image,
35
00:03:43,466 --> 00:03:45,600
it is an encrypted digital form
36
00:03:45,966 --> 00:03:51,833
And this encrypted digital form cannot be read and accessed by another software or system
37
00:03:55,000 --> 00:03:59,833
This data is only called for matching when the user authenticates the fingerprint
38
00:04:04,000 --> 00:04:07,300
The T2 chip manages the camera, microphone,
39
00:04:07,300 --> 00:04:10,433
speaker, and much of the hardware on a mac
40
00:04:16,700 --> 00:04:23,300
In the past, some software might have tried to surreptitiously wake up cameras and microphones
41
00:04:23,300 --> 00:04:25,966
to collect private data about users
42
00:04:28,966 --> 00:04:34,466
Even if we close the laptop, there may be situations that the microphone is called
43
00:04:38,400 --> 00:04:43,600
So what the T2 chip does is it disconnects the software directly from the hardware
44
00:04:43,600 --> 00:04:46,766
with this built-in audio and video controller
45
00:04:50,800 --> 00:04:53,300
So the T2 chip acts as a middleman
46
00:04:56,700 --> 00:04:59,833
If any software wants to access the hardware,
47
00:05:00,800 --> 00:05:04,000
it must first get permission from the T2 chip
48
00:05:07,533 --> 00:05:10,966
So those are some of the features of the T2 security chip,
49
00:05:15,466 --> 00:05:18,700
and I'll see you in the next video on the architecture of it
50
00:05:23,633 --> 00:05:25,733
Okay, so this is the T2 chip