[Replicant] Samsung Galaxy S6 Edge baseband exploit
Brian Kemp
brian.kemp at gmail.com
Fri Nov 13 04:07:47 UTC 2015
No. According to the twitter post, it was invisible to Android. It would
be similarly invisible to Replicant.
On 11/12/2015 06:31 PM, Moritz Bandemer wrote:
> On 13.11.2015 00:10, John Sullivan wrote:
>> Instructive example..
>>
>> https://twitter.com/kutyacica/status/664623913305944064
>>
>> Anything Replicant can or does do to guard against this kind of attack?
>>
>> -john
>
> AFAIK, (for now) only Samsung’s "Shannon" line of baseband chips are
> vulnerable to this explicit attack.
> Means, just modern Samsung devices (like S6, S6 Edge and Note 4) are
> affected, which are not supported by Replicant, yet.
> Source: http://www.theregister.co.uk/2015/11/12/mobile_pwn2own1
> _______________________________________________
> Replicant mailing list
> Replicant at lists.osuosl.org
> http://lists.osuosl.org/mailman/listinfo/replicant
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 213 bytes
Desc: OpenPGP digital signature
URL: <http://lists.osuosl.org/pipermail/replicant/attachments/20151112/38969a9b/attachment.asc>
More information about the Replicant
mailing list