How laptop Apple silicon Macs help prevent attack by malicious USB and TB devices using Accessory Security, and why some of them also have liquid detectors in their USB-C ports.
accessory security
Intended to counter hardware exploits, such as the checkm8 exploit of T2 chips and Thunderspy for Thunderbolt 3, this should prove valuable protection.
Overview of supported Macs, Accessory Security, Rapid Security Response, changes coming in notarization, and increasing support for Ukrainian.
