• 0 Posts
  • 3 Comments
Joined 1 year ago
cake
Cake day: July 19th, 2023

help-circle


  • Yes, it does, if they have full access to the disassembled hardware and assuming research time & resources they could do practically anything. Such as emulating the Secure Enclave chip with a “fraudulent” version, changing all firmware running on any semiconductors in the phone, isolating storage, I don’t know the details, but let your imagination loose.

    Physical, uninterrupted access is unlikely, yet bad news for anyone’s threat model.