The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Talk:GID Key"
(→Vaumnou: new section) |
ChronicDev (talk | contribs) (→ta: new section) |
||
Line 18: | Line 18: | ||
Then the only way to do fault analysis would be to poke around on the chip directly. Is it known whether the die is face-down or face-up on the PCB? |
Then the only way to do fault analysis would be to poke around on the chip directly. Is it known whether the die is face-down or face-up on the PCB? |
||
+ | |||
+ | == ta == |
||
+ | |||
+ | this sounds like a job for leet hacking super hero TA Mobile! |
Revision as of 20:32, 5 August 2008
drg
Would this be vulnerable to a cold boot attack?
geohot
I really doubt the AES key is ever in memory. This is an attack against drive encryption, not hardware coprocessors. Fault analysis or timing would be our best bet.
Vaumnou
Unless you can cause read faults by browning out the chip or the ROM is external, you can't use fault analysis. And if the ROM is external, it would probably be easier to unsolder it and read it directly.
pumpkin
it isn't external
Vaumnou
Then the only way to do fault analysis would be to poke around on the chip directly. Is it known whether the die is face-down or face-up on the PCB?
ta
this sounds like a job for leet hacking super hero TA Mobile!