As I know, in every processor architecture, there is some interrupt (signal) handlers, that will execute whenever an interrupt occurred (like whenever a system clock interrupt occurred). It is possible to override every interrupt handlers and operating system must override all of them to catch interrupts/signals/exceptions generated from running processes.
On 22 February 2014 19:32, Paul Kocialkowski <pa...@paulk.fr> wrote: > Le samedi 22 février 2014 à 11:44 +0200, dimonik, dimonik a écrit : > > Can boot loader contain some spying SW ? > > This is kinda hard to say. I've heard that on x86, it is possible that > the BIOS keeps executing code even after it started the system, so > perhaps something like that can happen too. > > The bootloader would then have access to all the hardware and could then > use it spy. > > My personal belief is that this is unlikely and that the bootloader > doesn't have any code left running at all once it loaded the system. > Since it only runs for a very short period of time and doesn't have any > internet access at this point, it is harmless for privacy (even though > it is a problem for software freedom). > > It could however access and change the stored software, or alter the > kernel in ram before executing it. That would lead to more serious > consequences. > > -- > Paul Kocialkowski, Replicant developer > > Replicant is a fully free Android distribution > > Website: http://www.replicant.us/ > Wiki/Tracker: http://redmine.replicant.us/ > > _______________________________________________ > Replicant mailing list > Replicant@lists.osuosl.org > http://lists.osuosl.org/mailman/listinfo/replicant > >
_______________________________________________ Replicant mailing list Replicant@lists.osuosl.org http://lists.osuosl.org/mailman/listinfo/replicant