Conversation

Replying to
Big difference between a device with components that are strongly hardened, highly audited and have good ongoing security support vs. the complete opposite. Also, portraying it backwards by misinterpreting how DMA / IOMMUs work is just wrong.
1
Replying to
Devices you're talking about have entirely closed source hardware and firmware. If you choose components that are known to be insecure and also don't apply fixes to known security vulnerabilities, backdoors are a non-issue, because you have the front door wide open to attackers.
2
Replying to
I don't know enough about the isolation options of the SoC here yet so I can't speak to that. But as I stated three times, I agree with you. We need to either be able to have SoC features to distrust the radios, or have replaceable radios to swap to trustworthy ones later.
1
Show replies