max wrote:
> Emmanuel Fleury wrote:
> 
>> Nevertheless, a second iPod would be extremely useful to us to run a
>> brute force attack on the headers of the firmware, trying to deactivate
>> the crypto-system at boot time (it is the first step to reach in order
>> to load some executable code on the hardware).
>>
> 
> If this is a non-destructive attack and recovery is possible, we could
> try to distribute it.

This is definitely a possibility to be considered !!!

Actually, we are trying just right now to settle down how to perform
properly (and as much efficient as possible) this experiment.

Anyway, thanks a lot for this idea !

Regards
-- 
Emmanuel Fleury              | Office: 211
Associate Professor,         | Phone: +33 (0)5 40 00 35 24
LaBRI, Domaine Universitaire | Fax:   +33 (0)5 40 00 66 69
351, Cours de la Libération  | email: [EMAIL PROTECTED]
33405 Talence Cedex, France  | URL: http://www.labri.fr/~fleury

_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to