Samsung Leak

zeynepaydogan zeynepaydogan at protonmail.com
Mon Mar 7 15:04:52 PST 2022


The leak contains:
- source code for each trusted applet (TA) installed in the Samsung TrustZone environment used for sensitive operations (e.g. hardware cryptography, binary encryption, access control)
- algorithms for all biometric unlock operations
- bootloader source code for all latest samsung devices
- confidential source code from Qualcomm
- source code for Samsung activation servers- the complete source code for the technology used to authorize and authenticate Samsung accounts, including APIs and services.

------- Original Message -------
zeynepaydogan <zeynepaydogan at protonmail.com> 5 Mart 2022 Cumartesi saat 14:41 tarihinde şunu yazdı:

> Samsung leaked data, in which:
> Sources of various Samsung products
> Authentication mechanisms
> Loaders
> Activation Servers
> Knox (mobile security system)
> API and Online services
> Proprietary components from Qualcomm
> All TA Applet (Trusted Applet) Codes, Key Management Codes, DRM Modules
> Components for biometric identificationThe whole thing was poured into a torrent etc…
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 2323 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20220307/52f2b643/attachment.txt>


More information about the cypherpunks mailing list