The decryption key for Apple's Secure Enclave Processor (SEP) firmware has been released according to the article in iClarified http//
Tools for the job are here https://
The Secure Enclave is responsible for processing fingerprint data from the Touch ID sensor, determining if there is a match against registered fingerprints, and then enabling access or purchases on behalf of the user. Communication between the processor and the Touch ID sensor takes place over a serial peripheral interface bus. The processor forwards the data to the Secure Enclave but can’t read it. It’s encrypted and authenticated with a session key that is negotiated using the device’s shared key that is provisioned for the Touch ID sensor and the Secure Enclave. The session key exchange uses AES key wrapping with both sides providing a random key that establishes the session key and uses AES-CCM transport encryption.
It is good news.
Good. )
Another article, with some more details for the layman
http//
"Decrypting the firmware itself does not equate to decrypting user data," xerub said. There's a lot of additional work that would need to go into exploiting decrypted firmware—in short it's probably not going to have a massive impact.
jaclaz
Apple now has a few weeks to change their SEP firmware towards a more secure version in iOS 11, a patent Apple was granted you find here
https://
and here
https://