Get the latest tech news

Almost Secure (2011)


Vulnerabilities are like good ideas - you’re rarely the first one dealing with it. Some vulnerabilities are almost classic, so I’ll proudly present: 7 old but surprisingly useful bugs that might also affect YOUR device.

The second method is useful if the write granularity is larger (for example 32-bit), because the first approach would require 4 * 2 32=17179869184 (worst case) decryptions on the device, which can take quite a long time. Back in the d-Box 2 days(German link, sorry), the boot sequence would by default load into a GUI that didn’t provide any remote access. This fact could be abused by short cutting a flash data line in the middle of the boot, causing the GUI binary to fail, eventually giving RSH access to the system.

Get the Android app

Or read this on Hacker News