petri on Nostr: ”The GoFetch app connects to the targeted app and feeds it inputs that it signs or ...
Published at
2024-03-22 06:08:25Event JSON
{
"id": "9c26b5f5a2b0d54fac6070bd56b5cc26d7ea17c967b7e1165cf22ec9e7e31023",
"pubkey": "e417ee3d910253993ae0ce6b41d4a24609970f132958d75b2d9b634d60a3cc08",
"created_at": 1711087705,
"kind": 1,
"tags": [
[
"client",
"Nootti",
"31990:59061610b8e76ce6a306acc07993a5f0328c2fd5021dd7c546e2507f8ad7643a:1699103355"
]
],
"content": "”The GoFetch app connects to the targeted app and feeds it inputs that it signs or decrypts. As its doing this, it extracts the app secret key that it uses to perform these cryptographic operations. This mechanism means the targeted app need not perform any cryptographic operations on its own during the collection period.”\n\nhttps://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/",
"sig": "eef3e8d9156439580dd9f8f14ea01c332672a925b87460e0f0ed3b5c75c73d207f386461dd4a3d7624d55281d2f08cc044e6b85f6d9185a9eebb9247395df7ce"
}