All aspects of it.
My curiosity comes from OS signing, with the recent news of in-box updates for iPhones. Apple has as far as I know never gotten a key leaked for iOS.
• How does Apple keep their keys secure?
• Where are the verification keys stored on iOS devices?
• Can anything be done if they leak?
• iOS devices require internet to activate, why is this so difficult to circumvent?
Add any additional information if you’re interested. Doesn’t have to be based on any Apple products.
I know the Xbox 360 used e-fuses in the CPU to prevent downgrading, anything similar?
As far as I know ReFS doesn’t support chkdsk as it should do all the magic automatically.
Problem is that it doesn’t work, and when it breaks you can’t fix it.
Can someone explain to me the hype on ZFS?
sysadmin