TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Breaking Samsung Firmware, or Turning Your S8/S9/S10 into a DIY “Proxmark”

146 点作者 tapper将近 5 年前

8 条评论

Polylactic_acid将近 5 年前
Just reading this post was a lot of work. I can&#x27;t imagine how these people find the time and patience to work this out from scratch.<p>Its also a show of how incredibly complex phones are where just the nfc chip has its own bootloader and firmware and update protocol.
评论 #24235550 未加载
评论 #24235217 未加载
TekMol将近 5 年前
Which Android phones can safely be rooted these days, if any?<p>Everytime one of my friends says they rooted their phone, I ask them how. And the answer is always &quot;I was on some website, downloaded some binary and executed it&quot;. So as I understand it, they make themselfes completely vurnurable to somebody from the internet who made that root binary.
评论 #24235915 未加载
评论 #24238154 未加载
评论 #24235965 未加载
评论 #24235589 未加载
评论 #24241060 未加载
评论 #24238675 未加载
Namidairo将近 5 年前
To my recollection, those three phones (Well, there are multiple SKU&#x27;s) have the ability to emulate magnetic stripe cards as well, in order to use Samsung Pay on older terminals without contact-less payments.
评论 #24235993 未加载
评论 #24235106 未加载
noodlesUK将近 5 年前
This is an incredible deep dive. I’ve had the fortune of seeing some of the people from pentest partners at a talk at my university, and it was one of the most interesting talks of my degree. I wish more people outside the security community played with all levels of the stack a bit more. It’s incredible to see what people can come up with.
评论 #24234478 未加载
melbourne_mat将近 5 年前
This is masterful work. I love the move from the now well understood s6 to the s9 in blind fashion.<p>I just can&#x27;t believe how dumb it was to put a memory read command into the older NFC chip! Maybe nobody thought about security back then?
ngcc_hk将近 5 年前
Well beyond my level and like the hacking of network protocol of video cam here, learn a lot. One minor thing to note is how c code is still ruled here as expected in embedded space.<p>And one annoying thing is how some of the constant like 4 and size of (which some is 4) is used Interchangably. Also some init of the Array has data but actually is a read into Array. Just to confuse reader ?
ngcc_hk将近 5 年前
One of the claims is that whilst iphone and most Android were hacked if one paid, pixel is safe. True ?
krankthat将近 5 年前
This is such an amazing write-up. Thank you for all your work and for taking the time to document this.