poddo@discuss.tchncs.de to Privacy@lemmy.worldEnglish · 1 year agoIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.comexternal-linkmessage-square1fedilinkarrow-up116arrow-down11cross-posted to: [email protected]
arrow-up115arrow-down1external-linkIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.compoddo@discuss.tchncs.de to Privacy@lemmy.worldEnglish · 1 year agomessage-square1fedilinkcross-posted to: [email protected]
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up3·1 year agoNo, no you cannot. Base band hardware runs proprietary binary blobs with full system access
No, no you cannot. Base band hardware runs proprietary binary blobs with full system access