|
2014-03-14
, 07:44
|
Community Council |
Posts: 4,920 |
Thanked: 12,867 times |
Joined on May 2012
@ Southerrn Finland
|
#32
|
The Following 2 Users Say Thank You to juiceme For This Useful Post: | ||
|
2014-03-14
, 11:24
|
Posts: 132 |
Thanked: 141 times |
Joined on Jan 2012
|
#33
|
Relevant: http://redmine.replicant.us/projects...GalaxyBackdoor
Earlier today, we talked about how the Replicant team found a potential backdoor in Samsung’s proprietary radio software. As demonstrated in a proof-of-concept attack, this allowed certain baseband code to gain access to a device’s storage under a specific set of circumstances. But upon closer inspection, this backdoor is most likely not as bad as it was initially made out to be.
A few hours after posting our previous article on the alleged backdoor, a highly respected security expert who wishes to remain anonymous approached us, stating that the way in which the proof-of-concept attack was framed by the Replicant team was a bit misleading. Essentially, it boils down to the POC requiring a modified firmware with with security features disabled. Thus, if a user is running an updated version of the official firmware, this attack will not work. To that end, the Replicant team even states in their write-up that SELinux would considerably restrict the potential files that the modem can access, such as those on the /sdcard partition.
Now, another highly trusted security researcher (XDA Recognized Developer djrbliss) has gone on record with Ars, stating that there’s “virtually no evidence” that this is indeed a true backdoor, although his reasons are a bit different. There is absolutely no indication at this time that the baseband file access can be controlled remotely. Rather, this is only a “possibility,” since the baseband software is proprietary. Instead, it’s far more likely that this was only ever intended to write radio diagnostic files to the /efs/root directory, as that is is the radio user’s home directory.
In summary, we shouldn’t rush to replace our Samsung phones just yet. There is absolutely no evidence to state that this can be controlled remotely. And even if it were possible, using SELinux, which is set to Enforcing in stock firmware, would restrict the radio user’s access.
|
2014-03-14
, 11:37
|
|
Posts: 6,447 |
Thanked: 20,981 times |
Joined on Sep 2012
@ UK
|
#34
|
maybe you misinterpreted something. My Browser (de_de) shows 4.2.2014 which is February 4th
|
2014-03-14
, 12:08
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#35
|
Yesterday there was an update to the topic already stating
"Samsung Backdoor May Not Be as Wide Open as Initially Thought"
The Following 4 Users Say Thank You to szopin For This Useful Post: | ||
|
2014-03-18
, 16:52
|
|
Posts: 237 |
Thanked: 502 times |
Joined on May 2010
@ Mittelfranken, Germany
|
#36
|
Where? My three browsers (MicroB, Firefox and now, just for the laugh, IE10) all show "Paul Kocialkowski, 02/04/2014 06:57 PM" near at the end, next to the link to the patch - as well on the top of the patch page. It's hard-coded in the page sources, not browser or locale dependent. Which was my point
|
2014-03-23
, 19:44
|
|
Posts: 7,075 |
Thanked: 9,073 times |
Joined on Oct 2009
@ Moon! It's not the East or the West side... it's the Dark Side
|
#37
|
|
2014-03-23
, 22:18
|
|
Posts: 6,447 |
Thanked: 20,981 times |
Joined on Sep 2012
@ UK
|
#38
|
The server probably does not locate you in North America it seems (the only place where month comes first).
The Following User Says Thank You to pichlo For This Useful Post: | ||
|
2014-03-25
, 14:34
|
|
Posts: 237 |
Thanked: 502 times |
Joined on May 2010
@ Mittelfranken, Germany
|
#39
|
SIM-Switcher, automated SIM switching with a Double (Dual) SIM adapter
--
Thank you all for voting me into the Community Council 2014-2016!
Please consider your membership / supporting Maemo e.V. and help to spread this by following/copying this link to your TMO signature:
[MC eV] Maemo Community eV membership application, http://talk.maemo.org/showthread.php?t=94257
editsignature, http://talk.maemo.org/profile.php?do=editsignature