Get the latest tech news
Almost Secure (2011)
Vulnerabilities are like good ideas - you’re rarely the first one dealing with it. Some vulnerabilities are almost classic, so I’ll proudly present: 7 old but surprisingly useful bugs that might also affect YOUR device.
The second method is useful if the write granularity is larger (for example 32-bit), because the first approach would require 4 * 2 32=17179869184 (worst case) decryptions on the device, which can take quite a long time. Back in the d-Box 2 days(German link, sorry), the boot sequence would by default load into a GUI that didn’t provide any remote access. This fact could be abused by short cutting a flash data line in the middle of the boot, causing the GUI binary to fail, eventually giving RSH access to the system.
Or read this on Hacker News