Sorry to ask that. Is there any news. I recall that some qualified people inside this project was trying to extract the content of FLASH ROM chip. I would like to learn if there were any improvements.
And I want to ask a question. Below is what I could understand about bootloader: 1.) bootloader is kept in FLASH. 2.) ARM940T cpu boots that bootloader inside FLASH 3.) bootloader contains decryption algorithm, and our precious secret key(or keys). 4.) bootloader decrypts firmware with using key data contained in firmware header and secret key in flash. 5.) firmware comes alive in nearly 10 seconds. Is there any mistake above. And questions depend on my bootloader problem: 1.) What happens if we fill key data in firmware header with 0x00 s? I don't think that Apple is so careless that they left such a backdoor. 2.) When is AUPD code used? Does it contains disk-mode firmware, or restoration and formatting code? Regards, Bahattin TOZYILMAZ
_______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
