The Following 3 Users Say Thank You to djselbeck For This Useful Post: | ||
|
2014-08-28
, 19:46
|
|
Posts: 2,355 |
Thanked: 5,249 times |
Joined on Jan 2009
@ Barcelona
|
#322
|
If you tamper with your device and have it still locked, you are well, you know ...
|
2014-08-28
, 19:55
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#323
|
That's why I was trying to figure out if flashing using fastboot has any benefit over booting via fasboot..
But fastboot flashing is also closed when the bootloader is locked, so it has no benefit at all.
|
2014-08-28
, 20:14
|
Posts: 113 |
Thanked: 303 times |
Joined on Dec 2013
@ Germany
|
#324
|
|
2014-10-20
, 19:40
|
Posts: 205 |
Thanked: 389 times |
Joined on Nov 2009
|
#325
|
|
2014-11-06
, 05:05
|
Posts: 139 |
Thanked: 176 times |
Joined on Oct 2012
|
#326
|
|
2014-11-19
, 13:28
|
Posts: 1,293 |
Thanked: 4,319 times |
Joined on Oct 2014
|
#327
|
hi!
I have created dd image from my mmcblk0p28 partition, recovered from it, but have been striken with btrfs problems (i guess) and frequent app crashes which were basically limiting my multitasking to just two simultaneosly opened apps.
Now i have a new install and i would like to transfer files from the home directory of the dd image to a phone, but there are no /home/nemo directory in dd image when mounted.
How to properly mount this dd image to access personal files from /home/nemo directory? Please help!
mkdir /backup mount -o loop backup.img /backup
|
2014-12-17
, 18:56
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#328
|
We already know that it is possible for us to build a signed Linux boot loader that will load unsigned boot images and we’ve tested this already. But a boot loader that loads unsigned boot images can have other consequences in terms of security. Here are the technical basics: It should be possible to enable or disable entering UEFI settings/UEFI shell at boot-up through a key combo – in there you can supposedly set up your own UEFI PK/db/dbx etc. keys It is possible to reboot into UEFI settings from Sailfish OS efilinux is used and has to be signed by something in UEFI PK/db/dbx and it can check signatures of the Linux kernel+initrd (boot images) We don’t currently use UEFI shim loader so no MOK functionality Kernel uses/can use CONFIG_MODULE_SIG kernel option There’s no ‘fastboot oem unlock’ functionality currently, but flashed images need to be appropriately signed towards SecureBoot configured keys in order to boot, but efilinux can be modified This is an invitation to discuss how we should make a device security configuration that has appropriate balance between hackability and privacy/security. Nothing is set in stone but there might be hardware or technology imposed limitations
|
2015-12-13
, 15:57
|
Posts: 3 |
Thanked: 1 time |
Joined on Dec 2015
|
#329
|
|
2015-12-13
, 17:33
|
|
Posts: 6,447 |
Thanked: 20,981 times |
Joined on Sep 2012
@ UK
|
#330
|
If you tamper with your device and have it still locked, you are well, you know ...