![]() |
2009-10-11
, 20:49
|
Posts: 222 |
Thanked: 205 times |
Joined on Jul 2009
@ Finland
|
#52
|
No, not necessarily a hacked kernel, actually if it checks checksum right after bootloader that is gonna be a bit hard. Provided it doesn't use CRC32 for that.
We're not talking about the average consumer. Or, at least, I am not. I'm talking about a Maemo version of Jon Lech Johansen
Since one can (theoretically) run the whole Maemo 5 OS on SBox, the hacker can indeed use a rootkit for QEMU.
![]() |
2009-10-11
, 21:19
|
|
Posts: 3,397 |
Thanked: 1,212 times |
Joined on Jul 2008
@ Netherlands
|
#53
|
![]() |
2009-10-11
, 21:33
|
|
Posts: 4,783 |
Thanked: 1,253 times |
Joined on Aug 2007
@ norway
|
#54
|
Or, at least, I am not. I'm talking about a Maemo version of Jon Lech Johansen.
![]() |
2009-10-11
, 21:39
|
|
Posts: 4,783 |
Thanked: 1,253 times |
Joined on Aug 2007
@ norway
|
#55
|
Well, if they do the DRM right, it works the opposite way. The binary is encrypted and will not run without it being decrypted by the chip and maybe some more. The whole chain to start the process is also verified with checksums etc., so one should not be able (easily) to dump the unencrypted version from the memory. The same way the whole audio chain is locked when an DRM'd music is played.
![]() |
2009-10-11
, 21:58
|
|
Posts: 3,397 |
Thanked: 1,212 times |
Joined on Jul 2008
@ Netherlands
|
#56
|
sounds like the trusted platform module (note that trust in this case is coming from the media companies and others that want to trust YOUR computer can not do something THEY dont like) that supposedly is the basis for the microsoft's next-generation secure computing base (NGSCB, also known as palladium).
![]() |
2009-10-11
, 22:27
|
|
Posts: 4,783 |
Thanked: 1,253 times |
Joined on Aug 2007
@ norway
|
#57
|
We have never seen a corporation sued for stopping DRM service of paid content (Microsoft, Google, ...), use remote killswitch (Apple, Amazon), intentionally crippling hardware (Nintendo, Sony), or heck using DRM itself on remote devices...
![]() |
2009-10-12
, 09:31
|
|
Posts: 3,105 |
Thanked: 11,088 times |
Joined on Jul 2007
@ Mountain View (CA, USA)
|
#58
|
![]() |
2009-10-12
, 09:45
|
|
Posts: 445 |
Thanked: 572 times |
Joined on Oct 2009
@ Oxford
|
#59
|
![]() |
2009-10-12
, 10:07
|
|
Posts: 600 |
Thanked: 742 times |
Joined on Sep 2008
@ England
|
#60
|
...What we are saying is that no matter what user will have access to new Maemo flagship devices unlocked, at least through the official Nokia distribution channels...
...if someone voluntarily signs a contract with an operator for a locked-in device and voluntarily purchases DRM apps or content, then I don't see what ownership and freedom rights can he really claim.
The Following 2 Users Say Thank You to eiffel For This Useful Post: | ||
We're not talking about the average consumer. Or, at least, I am not. I'm talking about a Maemo version of Jon Lech Johansen.
Since one can (theoretically) run the whole Maemo 5 OS on SBox, the hacker can indeed use a rootkit for QEMU. Once that is works its childs play to jailbreak the device. For example, spoofing or ignoring some system calls. MITM is also a potential vulnerability. Or one local hole in one of the bundled software.
Goosfraba! All text written by allnameswereout is public domain unless stated otherwise. Thank you for sharing your output!