The hacker, known by the nickname xerub, posted on the Internet the decryption key for the Secure Enclave (SEP) coprocessor firmware, which works with the confidential data of iPhone and iPad owners with the Touch ID. The key is to use security researchers and hackers to search for vulnerabilities on Apple devices.
Xerub published the program code on GitHub, with which it picked up the decryption key. The developer specified that for successful hacking, two things are required: img4lib and its tool for separating SEP firmware.
Apple introduced the Secure Enclave co-processor along with the iPhone 5s in 2013. This is a special coprocessor, where fingerprint data is processed and the user is identified. Thanks to this component, iPhone and iPad with Touch ID “turn” confidential information around the CPU, increasing security.
Secure Enclave works on a firmware called SEPOS with its own kernel, drivers, services, and applications. The data that gets to the processor is encrypted, which makes it difficult to access them. Nevertheless, thanks to xerub now for hackers and developers, this is not a problem.