Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What is TrustZone being used for in practice?


To provide the Android hardware-backed keystore [1]

If it's present, this is used by apps like 'Google Authenticator' and 'Symantec Vip access' to store credentials in such a way that they can't be copied off the device or backed up.

When this technology works perfectly, the idea is if you have a short passcode and someone steals your phone, they can't extract the encrypted data and brute-force the passcode without an electron microscope and a team of engineers.

Unfortunately, it can also be used for user-hostile applications like providing DRM and preventing backups and rooting.

[1] https://source.android.com/security/keystore/


This is not used by Google Authenticator. GA just keeps the parameters in an sqlite database. It doesn't do much to protect them.


Do you have a link documenting that Google Authenticator (or Symantec) uses it?


I'm reasonably certain about Symantec Vip Access, because I've decompiled it (download apk 3.1.3 -> dex2jar -> jd-gui). Class named ṝ method named ˎ make calls that look like calls to the android key store. Hard to be 100% certain because the code is obfuscated though.

I was wrong about Google Authenticator. I assumed it was the same as Symantec because of all the people online complaining about being unable to back up their credentials.


DRM for example, see this older post where a bug in Qualcomm's DRM software enabled full system compromise: http://bits-please.blogspot.com/2016/05/qsee-privilege-escal...


it's used for stuff like trusted firmware, and easily leads to devices being bricked


iPhones secure enclave, full disk encryption, Touch ID, etc. likewise on android.


Source?


He's a troll.

iPhones don't use it. They don't use Qualcomm SOC's.


Note that TrustZone is not a Qualcomm technology, but rather an ARM technology. Apple could have gone with TrustZone in their SOC.

(But yes, he is a troll and this whole case has nothing to do with Apple).


Nit: TrustZone isn't a Qualcomm technology, but KeyMaster is Qualcomm software built on top of it (and that appears to be where this break lies).


>iPhones

nah


Apologies to the uninformed downvoters :(

TrustZone is an ARM thing, and the iPhone Secure Enclave is indeed built on TrustZone.

Apple do not use Qualcomm and this a Qualcomm-specific bug. But Apple do use their own modded TrustZone.


http://www.apple.com/business/docs/iOS_Security_Guide.pdf page 7.

Despite widespread rumour to the contrary, the secure enclave on iPhones is a separate core, not just TrustZone on the main CPU.


Apologies, I stand corrected. All I've ever heard is it being explained as Apple's implementation of TrustZone, which conceivably could be modded so far as to be put on a separate coprocessor.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: