poddo to Privacy@lemmy.worldEnglish · 1 year agoIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.comexternal-linkmessage-square1fedilinkarrow-up116arrow-down11cross-posted to: technology@lemmy.worldreverseengineering@zerobytes.monster
arrow-up115arrow-down1external-linkIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.compoddo to Privacy@lemmy.worldEnglish · 1 year agomessage-square1fedilinkcross-posted to: technology@lemmy.worldreverseengineering@zerobytes.monster
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up3·1 year agoNo, no you cannot. Base band hardware runs proprietary binary blobs with full system access
No, no you cannot. Base band hardware runs proprietary binary blobs with full system access