Until recently I would have thought that publicly available code would be best for such devices too.

This link from lembas https://www.blackhat.com/html/bh-us-12/bh-us-12-archives.html#Brossard makes me wonder as the exploit described was quickly built upon coreboot. The openness of the code maybe helped a little too much?



Reply via email to