@JessTheUnstill honest question: how do you do that without creating a security nightmare? I’m not a security expert but it seems like it would be just handing out blueprints for more exploits on newer devices built on the same stack.
Top-level
@JessTheUnstill honest question: how do you do that without creating a security nightmare? I’m not a security expert but it seems like it would be just handing out blueprints for more exploits on newer devices built on the same stack. 5 comments
@JessTheUnstill ...oh the penny dropped for me now. So this is where going open source might also help close up loopholes? @alabut |
@alabut
Not really. Most of these devices are just under the covers just running a pretty standard Linux or BSD operating system + whatever drivers are needed for the hardware, so security vulns are all pretty well known. The proprietary application code wouldn't necessarily even need to be included, so long as the bootloader was unlocked so you could do something else with the hardware.