@marcan42 which FBI attack scenario
-
-
Replying to @SwiftOnSecurity
@SwiftOnSecurity All of them except jailbreak. The "get Apple to help" scenario, the "NAND replay" scenario, the "FIB the CPU" scenario, etc2 replies 0 retweets 2 likes -
Hey, referring to RPMB... Would you mind explaining why you think the mechanism is mostly useless because of vendor specific "backdoors"?
1 reply 0 retweets 0 likes -
eMMC devices all run firmware, and that firmware almost always has secret vendor specific commands that allow you to take over.
2 replies 0 retweets 0 likes -
Okay, I'm aware of that but more interesting is the question whether it is realistic to reverse engineer these commands.
1 reply 0 retweets 0 likes -
Sure BruteForce might be an option here, but that might not be trivial or am I wrong?
1 reply 0 retweets 0 likes -
If you think security by obscurity works you haven't been following the security industry for the past 2 decades.
3 replies 0 retweets 0 likes -
My goal is to understand the current attack surface in this particular area to map it to a new target. That's all.
1 reply 0 retweets 0 likes
You might want to watch this talk:https://media.ccc.de/v/30C3_-_5294_-_en_-_saal_1_-_201312291400_-_the_exploration_and_exploitation_of_an_sd_memory_card_-_bunnie_-_xobs …
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.