[tor-talk] Android Full Disk Encryption Broken - Extracting Qualcomm's KeyMaster Keys
grarpamp
grarpamp at gmail.com
Sat Jul 2 19:23:54 UTC 2016
http://bits-please.blogspot.fr/2016/06/extracting-qualcomms-keymaster-keys.html
https://github.com/laginimaineb/ExtractKeyMaster
https://github.com/laginimaineb/android_fde_bruteforce
https://github.com/laginimaineb?tab=repositories
In this blog post, I'll demonstrate how TrustZone kernel
code-execution can be used to effectively break Android's Full Disk
Encryption (FDE) scheme. We'll also see some of the inherent issues
stemming from the design of Android's FDE scheme, even without any
TrustZone vulnerability.
A couple of months ago the highly-publicised case of Apple vs. FBI
brought attention to the topic of privacy - especially in the context
of mobile devices...
Full disk encryption is used world-wide, and can sometimes be
instrumental to ensuring the privacy of people's most intimate pieces
of information. As we've seen, the current encryption scheme... can be
hacked by an adversary or even broken by the OEMs...
More information about the tor-talk
mailing list