poddo to Privacy@lemmy.worldEnglish · 2 years agoIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.comexternal-linkmessage-square1linkfedilinkarrow-up116arrow-down11cross-posted to: technology@lemmy.worldreverseengineering@zerobytes.monster
arrow-up115arrow-down1external-linkIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.compoddo to Privacy@lemmy.worldEnglish · 2 years agomessage-square1linkfedilinkcross-posted to: technology@lemmy.worldreverseengineering@zerobytes.monster
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up3·2 years agoNo, no you cannot. Base band hardware runs proprietary binary blobs with full system access
No, no you cannot. Base band hardware runs proprietary binary blobs with full system access