Breaking News
Comments
Newest First | Oldest First | Threaded View
jzwatches
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
jzwatches   10/18/2012 4:29:11 AM
NO RATINGS
Well, as a smartphone user, I'm not quite sure whether this article is supposed to benefit me as a consumer or is targetting phone manufacturers. I have a friend who used to own an iPhone. He found an article online that provided a method to "unlock" it and he was able to customize his iPhone with personalized tones and wallpapers. Thus, from his point of view as a consumer, such articles have benefited him in a way that he is able to use his phone the way he wants the phone to work, and not be restricted to only the default phone features. However, if this article is about ensuring that your phone is safe enough from hackers who wish to invade your privacy, then I'm definitely looking forward to the upcoming subsequent articles to tell me how to be on my guards. - http://www.jzandf.com

Mohit.arora
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
Mohit.arora   7/17/2012 10:32:14 AM
NO RATINGS
Justin, Thanks. Next part should be up in next 2 weeks (I hope) or earlier :-)

Mohit.arora
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
Mohit.arora   7/17/2012 10:31:30 AM
NO RATINGS
Thanks Steve, you are correct. Part 3 is going to cover all sort of secure bootloader options while Part 4 is going to extend it further covering ideal security platform that leverages the concepts from mobile world and apply on embedded/Industrial devices that need best in class security.

Mohit.arora
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
Mohit.arora   7/17/2012 10:29:46 AM
NO RATINGS
The whole idea was to take Smarphone as this as example so people could relate it better to the applications they know and then apply the concepts to embedded world. Part 3 will include more details on secure bootloaders while Part 4 will extend it to cover idea security platform inherits capabilities from the mobile world and can be incorporated in future embedded devices. Would be happy to receive any further feedback.

JustinTALA
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
JustinTALA   7/10/2012 2:25:01 PM
NO RATINGS
excellent article guyz. @author can you propose further reading please ? I'm super interested.

anon6223816
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
anon6223816   7/10/2012 1:31:45 PM
NO RATINGS
Let me clarify. By "if you use the lousy "security" approaches he's describing", I meant in part 2. Part 3 looks like he's going to describe a trusted boot sequence. Pay close attention, it's table-stakes if you want to play this game ;-).

anon6223816
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
anon6223816   7/10/2012 1:25:12 PM
NO RATINGS
Look at the titles of Part III and IV. It's clear that if you use the lousy "security" approaches he's describing, your products are easily cracked. Want to bet me that future parts will describe something better? Something made by Freescale? ;-) I used to work in this area. Cellphone security is complicated, and many chip and phone manufacturers are still on the steep part of the learning curve of how to do it. Phone hackers are extremely clever, and any half-hearted "security" system is going to be hacked - count on it.

gayatrikumar_1
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
gayatrikumar_1   7/10/2012 1:12:18 PM
NO RATINGS
Ok, now, People know the secret. Smart Phone Manufacturers will become smarter :)

Jeske
User Rank
Author
re: Deciphering phone and embedded security - Part 2: What really happens during an unlock operation
Jeske   7/10/2012 11:05:18 AM
NO RATINGS
It sounds weird to me an freescale specialist, giving away hints about ways to unlock smartphones...If I was a smatphone manufacturer, I'm not sure if I would be happy reading such articles.. for sure not the ones coming from the guins wo will be probably supporting new devs...



Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
Radio
NEXT UPCOMING BROADCAST

What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Are the design challenges the same as with embedded systems, but with a little developer- and IT-skills added in? What do engineers need to know? Rick Merritt talks with two experts about the tools and best options for designing IoT devices in 2016. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.
Most Recent Comments
dnadler017
 
realjjj
 
realjjj
 
jimfordbroadcom
 
jimfordbroadcom
 
resistion
 
jimfordbroadcom
 
jimfordbroadcom
 
realjjj
Like Us on Facebook
Special Video Section
LED lighting is an important feature in today’s and future ...
05:27
The LT8602 has two high voltage buck regulators with an ...
05:18
The quality and reliability of Mill-Max's two-piece ...
01:34
Why the multicopter? It has every thing in it. 58 of ...
Security is important in all parts of the IoT chain, ...
Infineon explains their philosophy and why the multicopter ...
The LTC4282 Hot SwapTM controller allows a board to be ...
This video highlights the Zynq® UltraScale+™ MPSoC, and sho...
Homeowners may soon be able to store the energy generated ...
The LTC®6363 is a low power, low noise, fully differential ...
See the Virtex® UltraScale+™ FPGA with 32.75G backplane ...
Vincent Ching, applications engineer at Avago Technologies, ...
The LT®6375 is a unity-gain difference amplifier which ...
The LTC®4015 is a complete synchronous buck controller/ ...
10:35
The LTC®2983 measures a wide variety of temperature sensors ...
The LTC®3886 is a dual PolyPhase DC/DC synchronous ...
The LTC®2348-18 is an 18-bit, low noise 8-channel ...
The LT®3042 is a high performance low dropout linear ...