As you all know, the 2ndboot and vulnerability hunting project has started months and months ago, one with some results (but still not useful), and the other without any result.
As far as we're seeing, finding a vulnerability in Milestone is nearly impossible.. it's powered by military equipment from TI (OMAP) and, well... I'm not discrediting the work done by droid-developers where I've put my partecipation (yakk, xvilka, Bavilo etc...) but I think that they're getting a bit off-road as they're now setting their own AOSP for Milestone without going on with vulnerability hunt.
The 2ndboot project seems died, as they've tried to boot MBM with 2ndboot for re-initing the modem, but failed. And it seems that modem reinit is almost impossible.
So, cracking the RSA key it's not an easy thing to do, but we can almost try, setting a BOINC project and giving our CPUs to the work: we can crack it in seconds, days, weeks, months.. or we can FAIL, but at this point it's worth trying to do it, as all the methods tried seems to be a fail...
Well, what I'm tryin' to do with this thread?
I need your collaboration and your help for this project as we need processing power. The more we have, less would be the time for finding the key.
I think that if we started this thing months ago, now we'd be able to flash our custom ROMs.
I can provide the BOINC server as I've got a dedicated server w/Linux (Gentoo) or FreeBSD, but I need help for setting it as I've never done a BOINC project and I don't know how it works.
Are you with me?
The Eugenia Project Developer