Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)https://alephsecurity.com/2018/01/22/qualcomm-edl-1/ …
Odgovor korisniku/ci @alephsecurity
This still requires the OEM's Signed Firehose to be leaked, on top of this, some newer versions of Firehose will not allow peek/poke if Secure Boot is Enabled.
03:27 - 22. sij 2018.
0 replies
0 proslijeđenih tweetova
2 korisnika označavaju da im se sviđa
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.