TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Replicant developers find and close Samsung Galaxy backdoor

81 点作者 dn2k大约 11 年前

5 条评论

fullofstack大约 11 年前
from <a href="http://www.reddit.com/r/netsec/comments/209h4d/samsung_galaxy_backdoor/cg1gy3l" rel="nofollow">http:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;netsec&#x2F;comments&#x2F;209h4d&#x2F;samsung_galax...</a> : This is not a backdoor. It&#x27;s a feature, and a reasonably common one for Qualcomm based devices. It&#x27;s an interface to allow the modem access to a persistent data store (ie. eMMC modem partitions) even though only the application processor may access the MMC controller. Have a look at the rmt_storage client documentation found in a Qualcomm kernel tree. It used to be pretty common to ship a rmt_storage daemon to do the very same thing Samsung is being accused of here (hint: Nexus 5 still uses it), I don&#x27;t know about other recent devices, but I&#x27;d imagine they&#x27;d employ something similar. Also, there are many more ways for the baseband to compromise the application processor, without an explicit interface.
评论 #7715800 未加载
评论 #7715771 未加载
kppi大约 11 年前
Nope: <a href="http://arstechnica.com/security/2014/03/virtually-no-evidence-for-claim-of-remote-backdoor-in-samsung-galaxy-phones/" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2014&#x2F;03&#x2F;virtually-no-evidenc...</a>
评论 #7715791 未加载
MrBuddyCasino大约 11 年前
2 months old, previously: <a href="https://news.ycombinator.com/item?id=7389258" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=7389258</a>
评论 #7715332 未加载
RafiqM大约 11 年前
For a split second I thought the developers were replicants.
rabino大约 11 年前
They say it so it must be true.
评论 #7715970 未加载