Very interesting. Some of it was over my head, but it didn't appear that the goal was surveillance or circumvention of security measures (aside from circumventing some boot verification of files). I assume the counterfeiters' goal is simply to make money. Anyone on the F-Secure team here by chance, and have a comment on that conclusion?
tl;dr: no backdoors, but they did have to break the hardware platform authentication security to run on the counterfeit hardware, which opens a persistence vector that isn’t there on authentic gear.<p>Great work!