Explore >> Select a destination


You are here

blog.thalium.re
| | comsecuris.com
5.3 parsecs away

Travel
| | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms.
| | insinuator.net
4.0 parsecs away

Travel
| | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ...
| | sergioprado.blog
4.4 parsecs away

Travel
| | This is the second part of the article about embedded Linux security.
| | captnemo.in
24.9 parsecs away

Travel
| [AI summary] The author shares insights from six months of using Ubuntu as their primary operating system, highlighting benefits like free software, better package management, and superior customization for developers compared to Windows.