![]() It's 2018, there's no such things as "facts". Wed 7th Feb "some solid/proven facts and figures would be nice".With a bootrom attack it seems likely they can just load any firmware code they want from the SD card. Of course, they will likely fix the chips of newly sold models.īy the way, a Coding 101 class that states that anything is possible ignores the Halting Problem and a related class of computational problems that can not be solved in general They attack the bootrom, which is already executed before the firmware (it is probably the part that loads and executes the firmware), so this must be a different type of attack than the one you are referring to. As a consequence, the bootrom memory can only be changed by taking out the particular chip in a Switch device and replacing it with one without the bug, which is probably a tad expensive to do for all the Switches that are already out there. ROM means read-only-memory, and to have a secured, unhackable system you pretty much need that the bootrom can not be changed (otherwise hackers can replace the code that starts the system with whatever they desire). Wed 7th Feb The tweet mentions they exploit a mistake in the bootrom, which is the piece of memory the Switch first executes after you push the power up button when the system is turned off. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |