poddo to Privacy@lemmy.worldEnglish · 1 year agoIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.comexternal-linkmessage-square1fedilinkarrow-up116arrow-down11cross-posted to: technology@lemmy.worldreverseengineering@zerobytes.monster
arrow-up115arrow-down1external-linkIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.compoddo to Privacy@lemmy.worldEnglish · 1 year agomessage-square1fedilinkcross-posted to: technology@lemmy.worldreverseengineering@zerobytes.monster
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up3·1 year agoNo, no you cannot. Base band hardware runs proprietary binary blobs with full system access