[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Android Full Disk Encryption Broken - Extracting Qualcomm's KeyMaster Keys



http://bits-please.blogspot.fr/2016/06/extracting-qualcomms-keymaster-keys.html
https://github.com/laginimaineb/ExtractKeyMaster
https://github.com/laginimaineb/android_fde_bruteforce
https://github.com/laginimaineb?tab=repositories

In this blog post, I'll demonstrate how TrustZone kernel
code-execution can be used to effectively break Android's Full Disk
Encryption (FDE) scheme. We'll also see some of the inherent issues
stemming from the design of Android's FDE scheme, even without any
TrustZone vulnerability.
A couple of months ago the highly-publicised case of Apple vs. FBI
brought attention to the topic of privacy - especially in the context
of mobile devices...
Full disk encryption is used world-wide, and can sometimes be
instrumental to ensuring the privacy of people's most intimate pieces
of information. As we've seen, the current encryption scheme... can be
hacked by an adversary or even broken by the OEMs...
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk