co_apprentice's profile picture. { Privacy Enhancing Technologies | Cryptography | Smart cards | PoS | Online Payments | Car Keyfobs | android-boot | Python } security enthusiast

Coapprentice

@co_apprentice

{ Privacy Enhancing Technologies | Cryptography | Smart cards | PoS | Online Payments | Car Keyfobs | android-boot | Python } security enthusiast

> Cellebrite does support, for example, Pixel 9 devices BFU. Meanwhile the screenshot indicates Cellebrite cannot unlock Pixel 9 devices running GrapheneOS BFU. 404media.co/someone-snuck-… Hi @GrapheneOS, what do you do more to harden screen lock authentication in Pixel?


Mechanical keys were never secure. But RFID electronic key is not secure either. Cars should not have a physical key at all. All modern cars should only have a cryptographically secure keyfob backed by Distance Bounding Protocol and a monotonic clock inside.

This app/tool assists an operator in creating a copy of a key without having the original one



Secure boot bypass on Samsung Galaxy A series. Secure boot chain is executed before Android Verified Boot verifies vbmeta. You can achieve root and can also flash custom images without unlocking the bootloader and it will still pass Play Integrity hardware backed attestation.

Better late than never! The slides of our talk "Attacking Samsung Galaxy A* Boot Chain" at @offensive_con can be found here: github.com/quarkslab/conf… The video is also available: youtube.com/watch?v=WJ7wkJ…



Coapprentice reposted

Still looking for those elusive data encryption keys on your Samsung A* series phone? Don't worry! Join security researchers @max_r_b and @DamianoMelotti today at 5pm at @offensive_con to learn how to break Secure Boot and tamper with your phone enough to get those pesky keys.

quarkslab's tweet image. Still looking for those elusive data encryption keys on your Samsung A* series phone?
Don't worry! Join security researchers @max_r_b and @DamianoMelotti today at 5pm at @offensive_con to learn how to break Secure Boot and tamper with your phone enough to get those pesky keys.

Coapprentice reposted

Also, it is funny when I see the channel pic

wanghan1995315's tweet image. Also, it is funny when I see the channel pic

Coapprentice reposted

android.googlesource.com/platform/packa… are how keys are fetched for Widevine Provisioning 4.0 if anyone is interested.


Coapprentice reposted

Plans to literally "hack the planet" foiled due to 500ms of latency that Andres instinctually investigated. The latency was due how the malicious code parsed symbol tables in memory. openwall.com/lists/oss-secu…

haxrob's tweet image. Plans to literally "hack the planet" foiled due to 500ms of latency that Andres instinctually investigated.

The latency was due how the malicious code parsed symbol tables in memory.

openwall.com/lists/oss-secu…

Coapprentice reposted

Measured boot already exist in Android, in uh 14-launched SoC? But it doesn't allow using it for encryption, it's here only to enforce Google monopoly, just a more secure key attestation. Using it to derive an encryption key isn't done by google and they have no plan for it \


Loading...

Something went wrong.


Something went wrong.