Smaller attack surface than QSEE doesn't change the fact that it does run software, and Apple CAN flash that software.
It's straightforward to see what the risks to SEP are based on the design https://www.google.com/patents/US8832465 …
-
-
-
Not the point.
-
The article doesn't compare attack surface, or talk about Qualcomm failing to isolate different use cases for QSEE.
-
It's not a technical whitepaper.
-
and the point of my rambly stream of consciousness in the middle was to describe attack surface differences.
-
aye, which is where second and third parties can flash it with any access to the /requisite/ software
-
Second and third parties cannot flash firmware/OS, and a QSEE vulnerability isn't a Secure Boot vulnerability.
-
not legally, easily, or by permission of the OEM, but it sure as hell happens. But yes, not a SB vuln
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.