<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>apple on Thoughts dereferenced from the scratchpad noise.</title>
    <link>https://beta.blog.3mdeb.com/tags/apple/</link>
    <description>Recent content in apple on Thoughts dereferenced from the scratchpad noise.</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 24 Apr 2026 00:00:00 +0000</lastBuildDate>
    
        <atom:link href="https://beta.blog.3mdeb.com/tags/apple/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>What Open Source Firmware Can Learn from Apple Pre-OS Security</title>
      <link>https://beta.blog.3mdeb.com/2026/2026-04-24-apple-t2-pre-os-security-lessons/</link>
      <pubDate>Fri, 24 Apr 2026 00:00:00 +0000</pubDate>
      
      <guid>https://beta.blog.3mdeb.com/2026/2026-04-24-apple-t2-pre-os-security-lessons/</guid>
      <description>Introduction Apple published the most comprehensive platform security documentation in the industry. The Apple Platform Security Guide (December 2024 edition, covering iOS 18.1) is the version we studied for this article. Instead of dismissing it because it&amp;rsquo;s closed-source, what if we read it as a blueprint?
From my perspective, the Apple Platform Security Guide represents state-of-the-art documentation of platform security. It is really great from the perspective of explaining to the community what the security features are and how those are used.</description>
    </item>
    
  </channel>
</rss>
