Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Even if the original software was built to work only one device, if it's ever leaked it provides a roadmap for targeted attacks which may apply similar workarounds though other means than the update path.


I would imagine the difficult part would not be writing the firmware (or rather, the changes), but code signing it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: