Software Flashcards
ASIF
3 Facts
Sparse format
Delta layers
Plugin for Amber
AMBER
Definition
Apple Modular Block Device Library
AEBD
Definition
Apple Encrypted Block Device
KNOX
2 facts
Asset database
Fast and secure storage
NBD
Definition
Network block device
FileVault
Definition, Use on ASM
Storage encryption with volume key
Class C protection on ASM
Data Protection
Definition
File Encryption
Data Vault
Definition
Restrict access to the data of an app from all other requesting apps
Sandbox access controls
Definition
Restrict what data an app can access
GCD
definition and description
Grand central dispatch
Execute code concurrently on multicore hardware by submitting work to dispatch queues managed by the system
Forward secrecy
Definition
Ensures session keys will not be compromised even if long term secrets used in the session key exchange are compromised
ARV
Definition
Authenticated root volume
Evil Maid Attack
Description
An attack on an unattended device, in which an attacker alters it in some undetectable way so that they can later access the device, or the data on it.
ABD
description
file format for external customers that support AMBER like functions
ACS
Definition
Apple Cloud Service
DT
Apple Team
definition, two goals
Developer Tools
Planning to use virtual machine to test different OS and Xcode
replace Xcode simulator
MAC stadium
Purpose
Build and run with macOS in the cloud
Journaling file system
Description
Keep track of uncommitted changes in a data structure to avoid data corruptions
CAS
Apple Technology
Description
Build server
What are the two ways to find build records?
xbs buildrecords
knox download/extract build-record
Libkrun
Description
Rust based virtual machine monitor that links directly to hypervisor framework
Orbstack
Purpose
Run docker container and Linux on macOS VM
Accelerate framework
Apple Software Stack
Description
Make large scale mathematical computations and image calculations using SME and AMX
define, who, what
ESP
Networking Technology
Encapsulating security payload
Member of IPSec set of protocols
encrypt and authenticate the data packets between computers using a VPN