Conversation

Replying to
Big difference between a device with components that are strongly hardened, highly audited and have good ongoing security support vs. the complete opposite. Also, portraying it backwards by misinterpreting how DMA / IOMMUs work is just wrong.
1
Replying to
The radios have persistent state, hardware identifiers and the ability to track location. If an attacker exploits them or they are malicious, then you're having your location tracked and there is a local attacker able to target the kernel driver and other components through that.
Replying to and
It's not even just the kernel driver exposed from the OS as attack service. It's the software stack using the kernel driver to talk to the radio too. It's all the kernel infrastructure exposed by that kernel driver as attack surface. In general, people don't write drivers with
2
Replying to and
the hardware explicitly treated as an adversary. You actually do get a lot from using an SoC platform with a huge amount of resources put into hardening components, isolating them, hardening drivers and also a whole lot of security researchers targeting it and improving it.
1
Show replies
Replying to
Keeping the carrier out of the OS is job 1. Can't ever stop location tracking with a cellular baseband because towers just measure signal strength to pin down your ESIN. This is why I don't see much option but to leave the radio off except when needed when privacy is the goal.