T2 security chip vulnerability can allow hackers to control Apple desktops, laptops

This means core operating system functions can be modified, while encrypted data can be collected or have malware planted for various uses.