A group of professionals and enthusiasts led by Maynard Handley, former Apple Quicktime developer, shared a 350-sheet PDF where they analyze the inner workings of the Apple M1 chip through results obtained by applying reverse engineering.
Bigger than Jesus! Longer gestating than Chinese Democracy! Rarer than Once Upon a Time in Shaolin!
It’s finally available in (very) preliminary form! My first masterpiece — M1 Explainer.https://t.co/h3RuiXlro2
1/@dougallj @ andreif7 @trav_downs @silicongang @stuntpants— Maynard Handley (@handleym99) September 13, 2021
Although this chip is based on the ARM architecture, so there is a lot of public information on its basis, carrying out a work of this style requires a great knowledge about said architecture and about the different reverse engineering methodologies, and even having this knowledge, Countless hours have to be spent performing various tests, discussing them, and documenting their results, so the work behind this document is impressive.
The document compiles not only the results obtained through reverse engineering, which include some experiments to study how Apple mitigated different vulnerabilities, but also a large collection of ARM documentation to understand all this information, so those interested in knowing how it works the Apple chip will have a lot of material to know in depth how it is built.
Handley clarified that this document is not a final version, and that it may seek to improve all this information, and also later expand with the arrival of the Apple M2 next year, so the adventure is just beginning.
The PDF with all the information obtained by this group is uploaded to Google Drive, and you can visit it by clicking here.