On 2010-12-30 9:41 PM, Peter Gutmann wrote:
The whole talk (in three parts) is fascinating viewing, particularly the
summary of jailbreaking of embedded devices:

- Pretty much all of the (public) jailbreaks were to get Linux or other
software onto the device, not for piracy.

- All the devices were hacked in anything from one week to twelve months (the
record, for the Xbox360).

- Most of them used crypto, and AFAICT in none of them was the crypto directly
broken (Shamir's Law, crypto is bypassed not attacked).

Some of that "bypassing" comes very close to an attack on the crypto - for example recovering the private key due their use of not at all random numbers.

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to