I don't know much about QPST, but I've become more familiar lately with eMMc functionality lately. I think it's a long shot, but it's a good idea none the less. I'm trying to correlate base addresses and binaries, and it's a mess.
My question to you Surge: have you ever heard of an OTA introducing a security loophole that didn't exist on older versions? I don't think Sammy has made any deep firmware modifications with the updates, so it's probably a waste of a thought. At least, none deep enough to affect the bootloader level binaries (probably, with the exception of closing the Loki loophole).
Sent from my SCH-I545 using xda app-developers app
---------- Post added at 06:25 AM ---------- Previous post was at 06:19 AM ----------
Do you think there's still anything to be learned from Dan Rosenberg's old S4 exploit?
http://blog.azimuthsecurity.com/2013/05/exploiting-samsung-galaxy-s4-secure-boot.html?m=1
Sent from my SCH-I545 using xda app-developers app
My question to you Surge: have you ever heard of an OTA introducing a security loophole that didn't exist on older versions? I don't think Sammy has made any deep firmware modifications with the updates, so it's probably a waste of a thought. At least, none deep enough to affect the bootloader level binaries (probably, with the exception of closing the Loki loophole).
Sent from my SCH-I545 using xda app-developers app
---------- Post added at 06:25 AM ---------- Previous post was at 06:19 AM ----------
Do you think there's still anything to be learned from Dan Rosenberg's old S4 exploit?
http://blog.azimuthsecurity.com/2013/05/exploiting-samsung-galaxy-s4-secure-boot.html?m=1
Sent from my SCH-I545 using xda app-developers app