Even coal plants stopped being built in the middle of cities half a century ago.
The internet is very big on Japonisme (not to say Orientalism) so I feel obligated to present a contrary viewpoint once in a while.
I've heard people call it "sun rays" or "sun beams" in English, but it's definitely not a well defined concept.
It's the Japanese word for sunlight, which is filtered through the leaves of the trees. In particular, it means the visible light rays. “Komorebi” is composed of several parts of the word: “Ko” means tree or trees. “More” means: something that comes through, something that shines through or seeps through. “Bi” means: sun or sunlight.
The word “Komorebi” reflects the romantic and emotional love of the Japanese for nature.
Governor Kathy Jochul today signed nation-leading legislation to combat match sales to protect kids. Sale of matches to children under the age of 18 is now prohibited. This historic legislation helps parents ensure their children can't self-immolate.
I was willing to believe that maybe it was just a massive NSA-scale research team up until the part with a custom hash function sbox. Apple appears to have known that the feature in question was dangerous and deliberately both hidden it, whatever it is, and then gone further and protected it with a sort of (fairly weak) digital signing feature.
As the blog post points out, there's no obvious way you could find the right magic knock to operate this feature short of doing a full silicon teardown and reverse engineering (impractical at these nodes). That leaves hacking the developers to steal their internal documentation.
The way it uses a long chain of high effort zero days only to launch an invisible Safari that then starts from scratch, loading a web page that uses a completely different chain of exploits to re-hack the device, also is indicative of a massive organization with truly abysmal levels of internal siloing.
Given that the researchers in question are Russians at Kaspersky, this pretty much has to be the work of the NSA or maybe GCHQ.
Edit: misc other interesting bits from the talk: the malware can enable ad tracking, and also can detect cloud iPhone service hosting that's often used by security researchers. The iOS/macOS malware platform seems to have been in development for over a decade and actually does ML on the device to do object recognition and OCR on photos on-device, to avoid uploading image bytes: they only upload ML generated labels. They truly went to a lot of effort, but all that was no match for a bunch of smart Russian students.
I'm not sure I agree with the speaker that security through obscurity doesn't work, however. This platform has been in the wild for ten years and nobody knows how long they've been exploiting this hidden hardware "feature". If the hardware feature was openly documented it'd have been found much, much sooner.
So did I missed your point?