I was just reminded of this piece that I wrote ten years ago now. It is still just as relevant today as it was back then. If you are working on any kind of reverse engineered product for hardware, learn how to care about your users to keep them safe.https://marcan.st/2011/01/safe-hacking/ …
-
-
You are protected from within macOS with SIP, which protects those system resources. From the shell in macOS Recovery or with SIP off, you’re expected to know what you are typing.
-
I know on iOS it doesn't get the normal blockdev adapter, but some "diagnostics readonly" one. IIRC with Project Sandcastle you get it exported as a blockdev though... might be wise to force that to readonly in the kernel :|
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.