Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

there are public exploits to patch secure enclave code for some of the checkra1n devices. pongoOS uses the blackbird exploit on some models to remove a check that disables access to user data if the SEPOS boot code determines the phone has been DFU booted by checking the hardware TRNG state. https://github.com/checkra1n/PongoOS/blob/master/src/drivers...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: