Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: tophat9000
So a quick translation of this is there embedding this in the bootstrap firmware...

The code that starts the computer up sets all the parameters and loads the operating system in

The opportunity to add that code to the firmware was closed by Apple last year. Now, the Firmware can no longer be updated or changed by any peripheral plugged into an ethernet, USB, or Thunderbolt port, which is what the CIA's software was designed to do. Even a SuperUser cannot update the firmware without an additional beyond SuperUser passcode to prevent just this kind of scenario and that passcode must be input manually from the keyboard.

45 posted on 03/23/2017 2:12:38 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 12 | View Replies ]


To: Swordmaker
>>>>the opportunity to add that code to the firmware was closed by Apple last year<<<<<

Not true. There are two chips in the phone AP (application processor) and BP (baseband processor). BP controls antenna and radio and runs RTOS (real time operation system). BP and AP share memory and BP can inject malicious code BEFORE AP loads OS.

BP can be controlled via fake cell tower installed close to the targetted phone.

Only secure custom phones costing $10K are not vulnerable to radio penetration.

59 posted on 03/23/2017 6:40:58 PM PDT by DTA (Drain the swamp)
[ Post Reply | Private Reply | To 45 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson