![]() The risk to home users is very low and EFI is generally only needed to exploit systems when they are already running 10.12.6 and have all updates applied and you can grant local physical access by a skilled technician of the hardware that's being attacked. It's getting a fair bit of mainstream coverage - but the headlines there are a bit click bait / overblown in my experience so far. Now - hardware like the Mac Pro (Early 2009) may have other worries due to being classified Vintage and Obsolete products as defined by Apple: Īlso - there is a nice paper by some long time Mac administrators that work for a security firm now with research on EFI updates and what happens without a check and users being shown when they are down level: Known regresssions generally are resolved with a newer patch on top, always advancing EFI versions as opposed to reverting. Technically, Apple service providers can get access to tools to revert firmware but that is more geared to when an update hangs as opposed to there being a known regression. Also, EFI updates now arrive with normal OS updates, so most people get these updates when you apply normal updates and not needing to run a separate EFI update. In general, these aren’t needed since the drivers for GPU and other functional aspects of running the system exist at the OS level which you can revert to freely. Apple doesn’t release tools to reverse an EFI update publicly.
0 Comments
Leave a Reply. |