View Single Post
GeneralAntilles's Avatar
Posts: 5,478 | Thanked: 5,222 times | Joined on Jan 2006 @ St. Petersburg, FL
#11
Originally Posted by Tantris View Post
I don't know how good the password protection is and where it is stored. It is, for example, possible, to boot an IT from a SD-Card. Is this blocked by a password?
You cannot boot from the SD card without having enough access to the device to modify the initfs (for someone not highly familiar with Linux, this would involve using fanoush's initfs_flasher, which must be run on a booted device). Either way, even if one were able to boot to something other than the rootfs, getting the rootfs mounted takes a bit of work from there.

Originally Posted by Tantris View Post
Is the filesystem mountable without the password?
Not easily over USB (and definitely not while the device is booted), but do not store anything of importance on either the 2GB internal flash or the MiniSD card.

I think probably the most important thing here is security through obscurity. Does the guy have any background with Linux? If so, any background with embedded ARM devices? There are no easily installable monitoring solutions available from the internet, and getting one running on the device would be quite involved.

Obviously, as has been stated already, physical access trumps all, but even with it, one would need a strong knowledge of Linux (and in particular, ITOS/maemo) to accomplish anything with it.