View Single Post
Posts: 986 | Thanked: 1,526 times | Joined on Jul 2010
#35
Originally Posted by Creamy Goodness View Post
Nobody explained how it works yet?
I don't really get it but it seems all the interesting stuff is in the .sh files.
It looks like it uses chroot and remounts the filesystems to temporarily gain access to some protected files used by dpkg/aegis when installing. It then patches in a dummy entry at the end of the file that can be used when installing later. Now, someone explain how wrong I am
yea, it's a security hole exploit. this is as much a demonstration of how aegis is ineffective in its fake-goal {keeping the user safe from external attack} as it is a practical tool for getting around aegis' real-goal {preventing full user control of the device to give nokia&partners the ability to do things not in the user's best interests}.
 

The Following 4 Users Say Thank You to wolke For This Useful Post: