max wrote: > Emmanuel Fleury wrote: > >> Nevertheless, a second iPod would be extremely useful to us to run a >> brute force attack on the headers of the firmware, trying to deactivate >> the crypto-system at boot time (it is the first step to reach in order >> to load some executable code on the hardware). >> > > If this is a non-destructive attack and recovery is possible, we could > try to distribute it.
This is definitely a possibility to be considered !!! Actually, we are trying just right now to settle down how to perform properly (and as much efficient as possible) this experiment. Anyway, thanks a lot for this idea ! Regards -- Emmanuel Fleury | Office: 211 Associate Professor, | Phone: +33 (0)5 40 00 35 24 LaBRI, Domaine Universitaire | Fax: +33 (0)5 40 00 66 69 351, Cours de la Libération | email: [EMAIL PROTECTED] 33405 Talence Cedex, France | URL: http://www.labri.fr/~fleury _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
