poddo@discuss.tchncs.de to Privacy@lemmy.worldEnglish · 1 year agoIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.comexternal-linkmessage-square1fedilinkarrow-up116arrow-down11cross-posted to: technology@lemmy.world
arrow-up115arrow-down1external-linkIntroduction to Hardware Restrictions: Can You Trust Your Phone?trustinghardware.compoddo@discuss.tchncs.de to Privacy@lemmy.worldEnglish · 1 year agomessage-square1fedilinkcross-posted to: technology@lemmy.world
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up3·1 year agoNo, no you cannot. Base band hardware runs proprietary binary blobs with full system access
No, no you cannot. Base band hardware runs proprietary binary blobs with full system access