Emmanuel Fleury wrote:
Nevertheless, a second iPod would be extremely useful to us to run a brute force attack on the headers of the firmware, trying to deactivate the crypto-system at boot time (it is the first step to reach in order to load some executable code on the hardware).
If this is a non-destructive attack and recovery is possible, we could try to distribute it.
regards, max _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
