SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Reading: What is Apple’s Memory Integrity Enforcement, and why does it matter? – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > Software > What is Apple’s Memory Integrity Enforcement, and why does it matter? – Computerworld
Software

What is Apple’s Memory Integrity Enforcement, and why does it matter? – Computerworld

News Room
Last updated: September 16, 2025 4:01 pm
News Room
Share
2 Min Read
SHARE

I make that assumption because MIE quite evidently relies on both hardware (the processor), as well as software – and the new iPhones introduce new chips which, logically, will eventually in some form extend to Apple’s PCs and tablets.

How does MIE work?

In brief, the protection relies on both hardware and software with key components including secure typed memory allocators, Enhanced Memory Tagging Extension (EMTE) in synchronous mode, and Tag Confidentiality Enforcement. What are these?

  • Secure typed memory allocators are Apple’s new system for memory management that secures memory handling at the hardware/software level.
  • Enhanced Memory Tagging Extension is Apple’s strengthened version of ARM’s Memory Tagging Extension (MTE). It assigns tags to chunks of memory and to every pointer to that memory so that when an app accesses memory the processor can check all the tags line up. If they don’t, access is blocked.
  • Tag Confidentiality Enforcement: This keeps those randomized tag values secret and ensures leaked data doesn’t include the values assigned to those tags.

These three technologies work together to block common memory attacks such as buffer overflows and use-after-free memory exploits, even at kernel level. This means that if malware tries to use a block of freed memory or tries a brute force attack or attempts to leak tag values, the tech prevents it. For a deeper dive into how the technology operates I urge you to look at Apple’s own guidance.

Read the full article here

You Might Also Like

Europe’s DMA should be repealed – Computerworld

MacStadium sees Apple adoption accelerating across US enterprises – Computerworld

Overzealous mobile regulation is bad for all – Computerworld

Apple may twin with Gemini for AI as iPhone 17 looms – Computerworld

macOS Tahoe is out of touch with Apple’s Touch Bar – Computerworld

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

As Rainbow Six Siege X numbers continue to slide, Ubisoft promises to crack down on cheaters and ‘prioritize a fun experience’ with future balance changes

October 8, 2025
AI

Nobel Prize in Physics awarded to quantum pioneers – Computerworld

October 8, 2025
Games

After cheaters broke Steam’s most popular roguelike’s leaderboards, its dev issued a fix and a warning: ‘Cheaters you better watch your ass or I’m clapping your cheeks back to the shadow realm where you belong’

October 8, 2025
Software

Computer mice can eavesdrop on private conversations, researchers discover

October 8, 2025
Games

All the playable clans in Vampire: The Masquerade – Bloodlines 2 and their clan abilities

October 8, 2025
Software

Apple’s DMA troubles in Europe continue, but a solution may be in sight – Computerworld

October 8, 2025

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?