http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone
> Nothing is checked, everything is automatically trusted. Lastly, the baseband > processor is usually the master processor, whereas the application processor > (which runs the mobile operating system) is the slave. > > So, we have a complete operating system, running on an ARM processor, without > any exploit mitigation (or only very little of it), which automatically > trusts every instruction, piece of code, or data it receives from the base > station you're connected to. What could possibly go wrong? -- Kim Holburn IT Network & Security Consultant T: +61 2 61402408 M: +61 404072753 mailto:[email protected] aim://kimholburn skype://kholburn - PGP Public Key on request _______________________________________________ Link mailing list [email protected] http://mailman.anu.edu.au/mailman/listinfo/link
