Business Continuity
Protecting Apple Devices from the checkm8 Exploit
On September 27th, 2019, a security researcher with the twitter handle @axi0mX published an exploit called checkm8, which can bypass Apple’s secure bootchain on specific...