Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Cellphones

T-Mobile G2 'Permaroot' Achieved 262

VValdo writes "After over a month of relentless hacking, genius scotty2 has finally smashed the G2's notorious emmc-read-only-on-boot mechanism, which had been incorrectly characterized in the press as a 'rootkit.' The hack involves several steps — first achieving 'temp root' through a fork bomb exploit, then running a specially crafted kernel module that power-resets the read-only emmc to bring it up in read-write mode. Finally, the bootloader is re-flashed, which permanently removes the read-only on subsequent boots. The whole process is expected to be automated by tomorrow."

Comment Re:outrageous (Score 2, Informative) 124

Security

Your Smartphone Is Safer Than Your PC — For Now 125

snydeq writes "InfoWorld's Galen Gruman reports on the future of mobile security — one that will see a significant rise in exploits as valuable information increasingly migrates to mobile devices. To date, sandboxing and code-signing have helped make mobile OSes relatively secure, when compared with their desktop brethren. But as devices store more valuable information than email, they will become more enticing to hackers currently breaking into Windows PCs. And the biggest bulls-eye appears to be on Android, in large part because its architecture is most like that of the desktop PC but also because there are so many variants in use — too many for Google or the carriers to patch securely. And as the PDF-jailbreak vulnerability showed, sandboxing has its limits when it comes to securing the browser — the most likely point of entry for exploits not due to the rise of extensions, helper objects, and plug-ins on the mobile Web."

Comment Re:Why BIS is bad (Score 1) 109

Sorry you are wrong, kinda. BIS ain't BES. BIS service connects you to your Gmail or HOtmail or whatever POP/IMAP account through your service provider. BES service uses higher encryption, and connects your device via the carrier to your own corporate BlackBerry Server which expands and decrypts the email and forwards it to your messaging server (Exchange, Domino, or GroupWise)or compresses and encrypts from the message server and forwards off to the HH. At no point is are those messagesx decryptable by RIM or anyone else (without spending way to many CRAY-years per message). There is a header that RIMs NOC uses to determine which carrier to hand off the encrypted data to, and which HH the carrier should send it to. BlackBerry's are capable of AES and 3DES encryption.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...