There is some speculation being bandied about that this is a rooted phone
proof OTA update mechanism for the Samsung Android system, or some such.
But it's insecurity-by-obscurity in that case, and irresponsible.

At which point, it seems like a good time to declare that this is my
personal opinion and not that of my new employer Blackphone (Silent
Circle/Geeksphone joint venture), where I am now serving as Privacy
Evangelist, which has to be the most delightful non-oxymoronic job title
EVAH!

*gryn*


On Wed, Mar 12, 2014 at 5:32 PM, Andrés Leopoldo Pacheco Sanfuentes <
alps6...@gmail.com> wrote:

> Did they get PAID!! ?  'cause those devices are VERY EXPENSIVE!!!
>
> Best Regards | Cordiales Saludos | Grato,
>
> Andrés L. Pacheco Sanfuentes
> <a...@acm.org>
> +1 (817) 271-9619
>
>
> On Wed, Mar 12, 2014 at 4:15 PM, John Sullivan <jo...@fsf.org> wrote:
> > (Sharing this from
> > <
> https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor
> >.)
> >
> > # Replicant developers find and close Samsung Galaxy backdoor
> >
> > *This is a guest post by [Replicant](http://replicant.us) developer
> Paul Kocialkowski. The
> >  Free Software Foundation supports Replicant through its Working
> >  Together for Free Software fund. [Your
> >  donations](
> https://crm.fsf.org/civicrm/contribute/transact?reset=1&id=19)
> >  to Replicant support this important work.*
> >
> > Today's phones come with two separate processors: one is a
> > general-purpose applications processor that runs e.g. Android; the
> > other, known as the modem, baseband or radio, is in charge of
> > communications with the mobile telephony network. This processor
> > always runs a proprietary operating system, and these systems are
> > known to have back-doors that make it possible to remotely convert the
> > modem into a remote spying device. The spying can be operated using
> > the device's microphone, but it could also use the precise GPS
> > location of the device and access the camera, as well as the user data
> > stored on the phone. Moreover, modems are connected most of the time
> > to the operator's network, making the back-doors nearly always
> > accessible.
> >
> > It is possible to build a device that isolates the modem from the rest
> > of the phone, so it can't mess with the main processor or access other
> > components such as the camera or the GPS. Very few devices offer such
> > guarantees. In most devices, for all we know, the modem may have total
> > control over the applications processor and the system, but that's
> > nothing new.
> >
> > While working on [Replicant](http://replicant.us), a fully free/libre
> > version of Android, we discovered that the proprietary program running
> > on the applications processor in charge of handling the communication
> > protocol with the modem actually implements a back-door that lets the
> > modem perform remote file I/O operations on the file system. This
> > program is shipped with the Samsung Galaxy devices and makes it
> > possible for the modem to read, write and delete files on the phone's
> > storage. On several phone models, this program runs with sufficient
> > rights to access and modify the user's personal data. A technical
> > description of the issue, as well as the list of known affected
> > devices is available at the Replicant wiki:
> > <
> http://redmine.replicant.us/projects/replicant/wiki/SamsungGalaxyBackdoor
> >.
> >
> > Provided that the modem runs proprietary software and can be remotely
> > controlled, that back-door provides remote access to the phone's data,
> > even in the case where the modem is isolated and cannot access the
> > storage directly. This is yet another example of what unacceptable
> > behavior proprietary software permits! Our free replacement for that
> > non-free program does not implement this back-door. If the modem asks
> > to read or write files, Replicant does not cooperate with it.
> >
> > Replicant does not cooperate with back-doors, but if the modem can take
> > control of the main processor and rewrite the software in the latter,
> > there is no way for a main processor system such as Replicant to stop
> > it. But at least we know we have closed one back-door.
> >
> > --
> > John Sullivan | Executive Director, Free Software Foundation
> > GPG Key: 61A0963B | http://status.fsf.org/johns |
> http://fsf.org/blogs/RSS
> >
> > Do you use free software? Donate to join the FSF and support freedom at
> > <http://www.fsf.org/register_form?referrer=8096>.
> > --
> > Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator at
> compa...@stanford.edu.
> --
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator at
> compa...@stanford.edu.
>



-- 

Shava Nerad
shav...@gmail.com
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to