OggS 0 kOpusHead8 OggS 0 z+OpusTags Lavf58.45.100 language=deu handler_name=SoundHandler encoder=Lavc58.91.100 libopus major_brand=isom minor_version=512" compatible_brands=isomiso2avc1mp41 author=stacksmashing genre=lecture$ title=Apple's iPhone 15: Under the CQ copyright=Licensed to the public under http://creativecommons.org/licenses/by/4.0 album=37C3 artist=stacksmashing description=Hardware hacking tooling for the new iPhone generation If you've followed the iPhone hacking scene you probably heard about cables such as the Kanzi Cable, Kong Cable, Bonobo Cable, and so on: Special cables that allow access to hardware debugging features on Lightning-based iPhones such as UART and JTAG. However with the iPhone 15, all of those tools became basically useless: USB-C is here, and with that we need new hardware and software tooling. This talk gives you a brief history of iPhone hardware hacking through the Lightning port, and then looks at the new iPhone 15, and how - using vendor defined messages, modifying existing tooling like the Central Scrutinizer, and a bit of hardware hacking - we managed to get access to the (unfortunately locked on production devices) JTAG interface exposed on the USB-C port on the new iPhone 15. And how you can do it using open-source tooling too.OggS 0 C>ay;.,.#%! :qw%!O ^i@A9*SyrtGcn7dNCw0mi~D-sxj52p@n]?W2Yw{'XmkM^iN>u&N`5)CRB4< v3b[nVTVJ80yFwSKZ d#%8ud`\d#ƈ(d G 7 E ȫ2' sP *%&<#k]+0P3YK=;@:D@,`F과w[0ѣh(8ș!rGU9>BI4s 7(qW3wKFs.SkK9e&CB3+FmzM C`oab5#+8[м.\p1#P=^.%L閘d9g5jee˔3- $}Ǟ(Twc(>'*=Fv ͌ıɗGz/jۥا%}R F.?m3kΝszϜr''vvhl){AT }' ɿ]7:zlIq'Z#eD{$6 TbeFq;{B{o0 /0Þ%CE It >-2A4:U qzF6k{M2r)Pz.ܥaT4N5}heǩ8w;UQ<0go,PIYDYs$-0*5Ms&YiUN\{ יH3 Ěa