Emmanuel Fleury wrote:

Nevertheless, a second iPod would be extremely useful to us to run a
brute force attack on the headers of the firmware, trying to deactivate
the crypto-system at boot time (it is the first step to reach in order
to load some executable code on the hardware).


If this is a non-destructive attack and recovery is possible, we could try to distribute it.

regards,
max


_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to