Hmm.
The most important of the links in this supposed takedown is dead.
The primary claim (about EL3) seems to be a nerdish complaint about the EXACT wording used in the first paragraph of the article, not anything especially deep.
And the overall complaint, "that it is AI slop", is this decade's ad hominem attack.
Why is it ad hominem to describe obvious AI slop as what it is?
I don't give a fsck about whether an AI wrote something, just like I don't care whether it was written by a female, a gay, or an <insert nationality>. What I care about is
1. Is it correct/true? and
2. Is it well-written? (ie appropriately ordered, explains things well, appropriately connects later ideas with earlier ideas, etc)
The article meets both these criteria.
No, it does not. It conflates a lot of things, it meanders, it is fuzzy, it uses overly emotive language to describe technical concepts, it mixes flights of fancy with things that are more plausibly factual without any sign of which is which. And it gets things just plain wrong.
It does have some dramatic lines that don't quite read like a LLM to me, more like a human blog owner trying to jazz up the AI slop. Consider the ridiculous opening line, "
The security of the macOS platform on Apple Silicon is not defined by the kernel; it is defined by the physics of the die". Completely insecure SoCs rely on exactly the same semiconductor physics as Apple's chips! The security of the system derives mainly from design choices - the information content in the secure boot ROM, the remainder of the secure boot chain the ROM hands control off to, the design of the isolations between application processors and coprocessors, and so forth.
Even if we put that aside as tasteless hyperbole by a bad and clueless writer, we're still left with something that doesn't sit right. Hyping Apple's trust root and implying that it's something unique or noteworthy is just not a thing any real security researcher would do. I'm not one of those, but even I'm aware that there are countless non-Apple SoCs which also use a mask ROM as their root of trust. I worked on such a chip almost 15 years ago; it's been standard practice for a long time.
But hey, let's go back to "is it correct/true". Despite you claiming that EL3 is only a minor nerdish complaint about wording, getting that wrong was actually an important sign that the original blog post really was just slop.
Although EL3 is an optional Arm feature, it's present in all Arm Holdings designed CPU cores, which is what the vast majority of Arm platforms are built on. Most of these use EL3 to implement Arm's TrustZone, a secure monitor that runs the 'real' OS as a VM guest at EL2 or lower (meaning: with less privileges than TrustZone). So if you did nothing but read Arm Holdings documentation (or, as a LLM, were strongly influenced by how much of that is available in the public scrapable Web), you'd come away thinking that EL3 and TrustZone are a defining feature of all things Arm.
But in Apple's modern systems, EL3 and TrustZone
simply do not exist. Although Apple does not document this in public, this was one of the first things noticed by M1 reverse engineering efforts (and even earlier; iirc they dropped EL3 several generations before A14/M1). If this blog had originally been written by anyone with a clue, they'd never have needed to correct that, because they would've gotten it right the first time. This is a notable area where Apple has diverged from the norm, which is supposed to be what the blogpost is about!
Even after the corrections, there's still plenty of signs that it's just LLM slop. One that stuck out to me is that it inappropriately refers to things as "New in Tahoe" which just... aren't. The first two are GXF and SPRR. Both of these are hardware features, therefore not introduced in Tahoe. Both are also much older than Tahoe - they've been around since at least M1/A14. Later, the post also claims that there's something new in Tahoe related to the "Guarded Execution Environment", in the process identifying that it thinks of the "Tahoe era" as "A15/M2+". This is such obvious slop - the LLM is conflating things that it shouldn't be, and got the timeline wrong to boot.