http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone

> Nothing is checked, everything is automatically trusted. Lastly, the baseband 
> processor is usually the master processor, whereas the application processor 
> (which runs the mobile operating system) is the slave.
> 
> So, we have a complete operating system, running on an ARM processor, without 
> any exploit mitigation (or only very little of it), which automatically 
> trusts every instruction, piece of code, or data it receives from the base 
> station you're connected to. What could possibly go wrong?


-- 
Kim Holburn
IT Network & Security Consultant
T: +61 2 61402408  M: +61 404072753
mailto:[email protected]  aim://kimholburn
skype://kholburn - PGP Public Key on request 




_______________________________________________
Link mailing list
[email protected]
http://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to