RE: [Cryptography] Android Full Disk Encryption Broken - Extracting Qualcomm's KeyMaster Keys
4 Jul
2016
4 Jul
'16
10:09 a.m.
Jerry Leichter <leichter@lrw.com> writes:
Lessons? Generality and power lead (to complexity, which is the enemy of security.
I think a more direct lesson here is that taking a security mechanism that consists of a bit flag used to tag a block of memory, defining any such tagged area as secure by executive fiat, and selling it as TrustZone, is no match for, you know, actually doing real security. It's not like this hasn't happened before, in 2013 Motorola cellphones got 0wned via attackers targeting the insecure TrustZone and attacking from inside that out to the (apparently) quite secure non-TrustZone code. Peter.
3051
Age (days ago)
3051
Last active (days ago)
0 comments
1 participants
participants (1)
-
Peter Gutmann