Reply
Thread Tools
Posts: 385 | Thanked: 426 times | Joined on Dec 2009 @ Gothenburg, Sweden
#211
one thing I just don't understand in this discussion (not arguing, just don't understand). Why would the modem as a part of the SoC be a threat to the information integrity? I see it merely as a wcdma transport, if encrypted information goes in it just transfer it to the uplink, it goes over the rnc, to the downlink and to the modem of some other device. Sure, we don't know what goes on inside it, but if the data is encrypted it remains so the whole way. I suppose you say that there is a possibility or probability that it would relay the data to a third party (e.g. government)? In such case I suppose that weakness could be present through the whole chain, as usual. compromised servers etc. I don't get it. It's a passive component right? Are we making a hen of a feather? Trust me, I don't trust anybody or anything, but aren't we already out in the open?
 
Community Council | Posts: 4,920 | Thanked: 12,867 times | Joined on May 2012 @ Southerrn Finland
#212
Originally Posted by Larswad View Post
one thing I just don't understand in this discussion (not arguing, just don't understand). Why would the modem as a part of the SoC be a threat to the information integrity? I see it merely as a wcdma transport, if encrypted information goes in it just transfer it to the uplink, it goes over the rnc, to the downlink and to the modem of some other device. Sure, we don't know what goes on inside it, but if the data is encrypted it remains so the whole way. I suppose you say that there is a possibility or probability that it would relay the data to a third party (e.g. government)? In such case I suppose that weakness could be present through the whole chain, as usual. compromised servers etc. I don't get it. It's a passive component right? Are we making a hen of a feather?
There are designs where the modem (and other parts of the system which run closed firmware blobs) is a separate HW entity which is connected to the main processing engine via a serial bus. In these cases you can treat it just as you describe, a black box that transmits your data up and down.

However, in some other designs the HW running closed blobs can directly access the flash&main memory of the device, and you have absolutely no guarantees on what it is reading/writing there (and when it does so)
The Qualcomm chipsets fall in the latter category
 

The Following 7 Users Say Thank You to juiceme For This Useful Post:
Posts: 385 | Thanked: 426 times | Joined on Dec 2009 @ Gothenburg, Sweden
#213
Originally Posted by juiceme View Post
There are designs where the modem (and other parts of the system which run closed firmware blobs) is a separate HW entity which is connected to the main processing engine via a serial bus. In these cases you can treat it just as you describe, a black box that transmits your data up and down.

However, in some other designs the HW running closed blobs can directly access the flash&main memory of the device, and you have absolutely no guarantees on what it is reading/writing there (and when it does so)
The Qualcomm chipsets fall in the latter category
Well that sucks horseballs, in that case I guess it's a somewhat different story. Its another weakness, but probably even worse since it has unrestricted access to *anything*, regardless of on-disk encryption.
Guess there could be reasons that we have no idea about why they want their modem code closed.
Thanks for the explanation!
 

The Following 2 Users Say Thank You to Larswad For This Useful Post:
Guest | Posts: n/a | Thanked: 0 times | Joined on
#214
Originally Posted by Larswad View Post
Guess there could be reasons that we have no idea about why they want their modem code closed.
Sure, if its compromised. Well, there you go, full access to whatever on a system-level.
This is what I want to achieve :P
 

The Following 2 Users Say Thank You to For This Useful Post:
Guest | Posts: n/a | Thanked: 0 times | Joined on
#215
To summarize possible ways to 'recover restore' Jolla:

1. We have images. Those can be restored using dd
a. On a working device in terminal. Allthough, this will give issues on some partitions, but, bootloader can be restored this way.
b. fastboot custom kernel with telnet access and using dd to restore backked up images.

2. Possibly using QPST tool (Windows, or perhaps Python script)
a. Not sure, but seems like images we have can be used restoring partitions. Windows only, unless Python tool can be used.

3. fastboot restoring images from SD-Card
a. There seems to be this option if entering fastboot mode without USB connected. We need to figure out what is expected on SD card here.

4. custom recovery
a. Jolla already made a simple recovery option to factory reset device. Can we create similar with backup/restore options etc.
 

The Following 5 Users Say Thank You to For This Useful Post:
Posts: 728 | Thanked: 1,217 times | Joined on Oct 2011
#216
Originally Posted by nieldk View Post
Sure, if its compromised. Well, there you go, full access to whatever on a system-level.
This is what I want to achieve :P
Well, this is possible, but in modems of cheaper phones (dumbphones as they call it). You need some sort of kit though.
I guess the fact that the modem is locked down so much demonstrates how weak the cellular protocols are. I saw some nasty things being done with full access to a modem.
It does bother me, however, that the modem part can do whatever it wants. Time to move away from Qualcomm? :-)
 

The Following User Says Thank You to ggabriel For This Useful Post:
Community Council | Posts: 4,920 | Thanked: 12,867 times | Joined on May 2012 @ Southerrn Finland
#217
The gsm/wcdma protocol stack is somewhat trusting in both ends. There are some messages and structures that have integrity protection but in general it is assumed that neither RAN nor UE is delibrately malicious.
 

The Following User Says Thank You to juiceme For This Useful Post:
Posts: 1 | Thanked: 0 times | Joined on Dec 2013
#218
Originally Posted by joerg_rw View Post
For me not baltic sea but "will it blend"
Excellent idea to make your own blend.

Why not just keep the old bootloader to boot your image (factory reset) and for the the normal Jolla image, pinpoint which package that brings it in, modify it and share it ("ssu er unlockedboot").
 
Posts: 113 | Thanked: 303 times | Joined on Dec 2013 @ Germany
#219
Originally Posted by ggabriel View Post
Have you considered asking this in together.jolla.com so that people can vote and Jolla can react?
Hello,

good point, although I mailed it to jolla I created this two entries:

https://together.jolla.com/question/...even-with-git/

https://together.jolla.com/question/...re-components/

greetings
 

The Following 7 Users Say Thank You to djselbeck For This Useful Post:
joerg_rw's Avatar
Posts: 2,222 | Thanked: 12,651 times | Joined on Mar 2010 @ SOL 3
#220
Originally Posted by torgil View Post
Excellent idea to make your own blend.

Why not just keep the old bootloader to boot your image (factory reset) and for the the normal Jolla image, pinpoint which package that brings it in, modify it and share it ("ssu er unlockedboot").
I don't have the time and no interest in a device that's not "unbrickable" and needs hacks or even exploits to work with it. I already abandoned damn harmattan due to this.
I could sell the thing on fealbay when Jolla wouldn't delay the red TOH which will cause significant loss of money when not included in such purchase.
Jolla for Murphy award.

/j
__________________
Maemo Community Council member [2012-10, 2013-05, 2013-11, 2014-06 terms]
Hildon Foundation Council inaugural member.
MCe.V. foundation member

EX Hildon Foundation approved
Maemo Administration Coordinator (stepped down due to bullying 2014-04-05)
aka "techstaff" - the guys who keep your infra running - Devotion to Duty http://xkcd.com/705/

IRC(freenode): DocScrutinizer*
First USB hostmode fanatic, father of H-E-N
 

The Following 3 Users Say Thank You to joerg_rw For This Useful Post:
Reply


 
Forum Jump


All times are GMT. The time now is 21:36.