Conversation

Replying to
The radios have persistent state, hardware identifiers and the ability to track location. If an attacker exploits them or they are malicious, then you're having your location tracked and there is a local attacker able to target the kernel driver and other components through that.
2
Replying to and
It's not even just the kernel driver exposed from the OS as attack service. It's the software stack using the kernel driver to talk to the radio too. It's all the kernel infrastructure exposed by that kernel driver as attack surface. In general, people don't write drivers with
2
Replying to and
the hardware explicitly treated as an adversary. You actually do get a lot from using an SoC platform with a huge amount of resources put into hardening components, isolating them, hardening drivers and also a whole lot of security researchers targeting it and improving it.
1
Replying to
A radio that's compromised is a tracking device that you're carrying around with you and that includes Bluetooth, Wi-Fi, etc. Not to mention that things like Wi-Fi pose a greater threat than you probably realize. They can actually gain info on the environment beyond location.
1
Replying to
No, I don't, and I specifically brought up that it's pretty bad to be switching away from a modem with substantial auditing, mitigations, sandboxing, research directed at it, a driver which is designed not to trust it and has a lot of attention from researchers for that, etc.
Replying to
Look, go ahead and get hardware that's insecure and unfixable from day one. Give up on trying to peddle scams and misinformation to me. You really don't know the subject matter, and it's not interesting to have you try to explain things to me that you don't know about.
1
Show replies